Security 101 for No- techies

114

Transcript of Security 101 for No- techies

Page 1: Security 101 for No- techies
Page 2: Security 101 for No- techies

Security for Non-Techs

Bulletproof

Page 3: Security 101 for No- techies

Introduction to IT Security Understanding the Modern Business Landscape Where IT Leaders are focusing Understanding the core principles of IT Security

3 Focus Areas Ransomware Passwords Wi-Fi Security

Short 5 Minute Break

Barnier Law Legal Side of IT Security

Format

Page 4: Security 101 for No- techies

Before We StartGround Rules

Page 5: Security 101 for No- techies

Ask Questions

Page 6: Security 101 for No- techies

Tell me if this is what you hear!

Page 7: Security 101 for No- techies

Slides will be availible afterwards!

Page 8: Security 101 for No- techies

Obviously Confidential

Page 9: Security 101 for No- techies
Page 10: Security 101 for No- techies

The World Has Changed!

Page 11: Security 101 for No- techies
Page 12: Security 101 for No- techies

Agility & Mobility

Page 13: Security 101 for No- techies

Increased Complexity

Page 14: Security 101 for No- techies
Page 15: Security 101 for No- techies

Top 3 Focus Areas of IT Leaders around the world

Page 16: Security 101 for No- techies

Top Challenges Focus on Users

Page 17: Security 101 for No- techies

Increasing Security Measures

Page 18: Security 101 for No- techies

“It Takes The Entire Organization— Not Just The Latest Technology—to Keep

Sensitive Data And People Safe”

Page 19: Security 101 for No- techies

What’s Your Security Strategy?

Page 20: Security 101 for No- techies

Security Through Risk Management

Security Through Obscurity

Page 21: Security 101 for No- techies

Security Through Obscurity•We store our passwords at uptakedigital.com.au/passwords

– but no one knows its there so we are safe.

• Our staff are good people and would never steal or compromise data in our organisation.

•We are only a small business, we are one of millions.who will attack us when they can attack the big targets?

Page 22: Security 101 for No- techies

The End of Security Though Obscurity

Page 23: Security 101 for No- techies
Page 24: Security 101 for No- techies

Security Through Risk Management•We use a Password Manager to encrypt, control and store

company passwords.

•We have strong policies and procedures to protect company information from being compromised

•We encrypt our sensitive files to protect our customers information.

Page 25: Security 101 for No- techies
Page 26: Security 101 for No- techies

The Two Most Important Ideas of IT Security

Page 27: Security 101 for No- techies
Page 28: Security 101 for No- techies

Think Layers

Page 29: Security 101 for No- techies

Think Trust

Page 30: Security 101 for No- techies
Page 31: Security 101 for No- techies

Ransomware

Page 32: Security 101 for No- techies

50% of Hospitals have had Ransomware

Page 33: Security 101 for No- techies
Page 34: Security 101 for No- techies
Page 35: Security 101 for No- techies
Page 36: Security 101 for No- techies
Page 37: Security 101 for No- techies

Antivirus doesn’t work like it used to

Page 38: Security 101 for No- techies

Typical Scenario

Page 39: Security 101 for No- techies

• Very Busy

• Manages Finances/HR

Page 40: Security 101 for No- techies
Page 41: Security 101 for No- techies
Page 42: Security 101 for No- techies
Page 43: Security 101 for No- techies
Page 44: Security 101 for No- techies

Time to Enact The Ransomware Plan

Page 45: Security 101 for No- techies

“No Worries MateWe Will Just Restore the

Backup”

Page 46: Security 101 for No- techies

Backup Encrypted

Page 47: Security 101 for No- techies
Page 48: Security 101 for No- techies

“You left the backup plugged in, we will have to pay the ransom mate”

Page 49: Security 101 for No- techies

Hello SirI will help you get the bitcoins you

need.

Page 50: Security 101 for No- techies
Page 51: Security 101 for No- techies

Files Decrypted

Page 52: Security 101 for No- techies

“Phew, That was close.”

Page 53: Security 101 for No- techies

Preventing and Preparing for a

ransomware attack

Page 54: Security 101 for No- techies

First take some preparatory steps

• Ransomware DR Plan

• Build a strong security stack

• Improve IT Planning and Audit Process

Page 55: Security 101 for No- techies

The most important thing

• Secure Offsite Backup

• Documented Continuity Plan

• Regular Backup Testing

Page 56: Security 101 for No- techies
Page 57: Security 101 for No- techies

Passwords

Page 58: Security 101 for No- techies

63% of confirmed data breaches involved hackers leveraging weak, default,

or stolen passwords.

Page 59: Security 101 for No- techies

Passwords in the wild

Passwords in the Wild

Page 60: Security 101 for No- techies

174 million passwords cracked in one week

Page 61: Security 101 for No- techies

So what can you do?

Page 62: Security 101 for No- techies

Passwords you need to remember

Page 63: Security 101 for No- techies
Page 64: Security 101 for No- techies

Hard to Guess, Not in the PW Dictionary

Page 65: Security 101 for No- techies
Page 66: Security 101 for No- techies

Passwords you don’t need to remember

Page 67: Security 101 for No- techies

100+ Password

s

Page 68: Security 101 for No- techies
Page 69: Security 101 for No- techies

Passwords I must memorise

• Password Manager (PM)• Laptop Password• Office 365 Password• Phone Lock code

Passwords the PM can remember

• Banking Password• Mailchimp Password• Facebook Password• Credit Card Details• 100+ other passwords

Page 70: Security 101 for No- techies

Password for my laptopDish-Tide-Engineer-Horizontal-7(bad at remembering characters)

Password for my zip archivejo&^sNG,j(}Ip|"9jo&^sNG,j(}Ip|"9(good at remembering characters)

Page 71: Security 101 for No- techies

Password Managers• Store Passwords in an encrypted form

• Help come up with passwords on your behalf

• Can automatically change passwords for you (and alert you of breaches)

• Allow you to share passwords securely

• Have reporting mechanisms to alert the organisation to weak passwords

Page 72: Security 101 for No- techies

Save

50 Hours a year!

Page 73: Security 101 for No- techies
Page 74: Security 101 for No- techies
Page 75: Security 101 for No- techies
Page 76: Security 101 for No- techies

Multi-Factor Auth (MFA)

Page 77: Security 101 for No- techies

something you have something you know

something you are

Page 78: Security 101 for No- techies
Page 79: Security 101 for No- techies
Page 80: Security 101 for No- techies

SSO – Single Sign On

Page 81: Security 101 for No- techies

Wi-Fi Security

Page 82: Security 101 for No- techies

Outside of the Office

Page 83: Security 101 for No- techies
Page 84: Security 101 for No- techies
Page 85: Security 101 for No- techies

Avoid Public Wi-Fi like the plague

Page 86: Security 101 for No- techies

When outside the safety of your firewall…

Page 87: Security 101 for No- techies

Inside of the Office

Page 88: Security 101 for No- techies

Have you ever let an external party on your

internal network?

Page 89: Security 101 for No- techies
Page 90: Security 101 for No- techies
Page 91: Security 101 for No- techies

OPEN, WEP, WPA(insecure)

WPA 2Enterprise(Radius)

WPA 2Personal

(PSK)

Page 92: Security 101 for No- techies
Page 93: Security 101 for No- techies
Page 94: Security 101 for No- techies
Page 95: Security 101 for No- techies
Page 96: Security 101 for No- techies
Page 97: Security 101 for No- techies

Think Layers

Page 98: Security 101 for No- techies

Think Trust

Page 99: Security 101 for No- techies

SECURITY MINDSET

Page 100: Security 101 for No- techies

Any Questions?

Page 101: Security 101 for No- techies

Bulletproof Security for Non-Techs

Your Legal responsibility and how to manage it

Page 102: Security 101 for No- techies

Your Business / Company

• Sole Trader• Family business• Partnerships• Joint ventures• Companies – small, medium,

large

Page 103: Security 101 for No- techies

Your Business / Company

Owner / Directors

• Sole Trader/ Owner• Partners• Family member management

committee• Board

Page 104: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

• Family members• Relatives• Staff• Employees• contractors

Page 105: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

Customers

Your Customers

• Customer personal information• Name, address, mobile• Bank Acc. / Credit card details• Age / gender

Page 106: Security 101 for No- techies

The Wake-up Call

Here’s the rest of the story...

Page 107: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

Customers

Duty of Care

Duty of Care to keep customer information private:

• Likely harm if disclosed (eg. reputational / financial)• Reasonable care to avoid harm by disclosure• Negligence leading to a breach of duty of care

Page 108: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

Customers

Duty of Care

Basic Business Risk:– leak of confidential information, including • customer personal information • trade secrets (eg. suppliers, procedures, client list)• Staff personal information

Basic Business Structure

Page 109: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

Customers

Duty of CareIT Dept /

Ext Provider

Storing Customer & Business information:

• Hardware / Software• Internet / Intranet• Specialist programs / Fire-walls• Information security

Page 110: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

Customers

Duty of CareIT Dept /

Ext Provider

Employment Contract

Contract Clauses include:

• Confidentiality & non disclosure of information

• Act honestly & with integrity• Comply with organisation policies /

directions

Page 111: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

Customers

Duty of CareIT Dept /

Ext Provider

Employment Contract

Board Policies

• Risk Identification & minimisation• Confidentiality• Code of Conduct• Delegation of Authority & Governance

Page 112: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

Customers

Duty of CareIT Dept /

Ext Provider

Employment Contract

Board Policies Management Procedures

• Confidentiality & Disclosure of information• Privacy Policy / Staff Code of Conduct / Internal Procedures • Intranet / Internet / Email use

Page 113: Security 101 for No- techies

Your Business / Company

Owner / Directors Employees

Customers

Duty of CareIT Dept /

Ext Provider

Employment Contract

Board Policies Management Procedures

Elements of reducing your Liability for damages from a breach of the Duty of Care you owe to your Customers

Page 114: Security 101 for No- techies