140 likes | 272 Views
Protecting Your Business Against the Unthinkable SBA Houston, August 2, 2006 Mark Piening Sr. Director Worldwide SMB Marketing. Small Businesses Are Interacting In New Ways. Your Business Is Changing. Technology surrounds our work and private lives
E N D
Protecting Your Business Against the UnthinkableSBA Houston, August 2, 2006Mark PieningSr. Director Worldwide SMB Marketing
Your Business Is Changing • Technology surrounds our work and private lives • The Internet has redefined business dynamics • Email anytime, anywhere • Instant messages at a blink of an eye • Wireless everything – mobile phones, wireless networks • Access to work from home, hotel, airport • Huge amounts of data stored on computers and servers
With Opportunities Come Risks 35% of Small Businesses Use Instant Messaging (IM) IM threats grew by 1,693% in 2005 57% of SMBs with websites generate significant revenue online In 2005, US consumers lodged more than 196,503 internet related fraud complaints with the FTC Usage of converged mobile devices grew 50% worldwide One in five organizations said they have sustained financial losses due to attack on mobile data platforms Sources: IMlogic Threat Center report, Jan 2006; Interland Small and Medium-sized Business Barometer, September 2005; Federal trade commission, 2006; IDC, 2005; PC World, April 2006;
The Problem… • Malicious Attacks • Viruses • Worms • Trojan Horses • Phishing • SpyWare • Environmental Impacts • Power Outages • Floods • Tornadoes • Etc. Common Denominator: Loss of System and/or Important Information • User Mishaps • End User Error • Theft • Fat Finger • Hardware/Software • Hard Drive • Motherboard/Power • System Corruption • Failed Patch or Update
Program Viruses Macro Viruses E-mail Worms Network Worms Flash Worms Contagion Period Evolution of Virus/Worm Threats • The latest threats now spread orders of magnitude faster than years ago, from months to nearly seconds months days Contagion Period hrs mins secs 1990 Time 2006
Today’s Attacks Are Motivated By Financial Gain • With the growth in phishing and other financial motivated attacks, Small Businesses are at risk Top Targeted Industries Source: Symantec Internet Security Threat Report Volume IX Published: March 2006 Small Business is often a target because they do not always have adequate protection
Threat Impact On Small Businesses Direct Losses Indirect Losses • Theft, Money, Digital Assets • Computer Resources • Trade Secrets • Consumer Information • Loss of Potential Sales • Negative Brand Impact • Loss of Competitive Advantage • Loss of Goodwill Productivity Losses Legal Exposure • Diversion of Funds • Continuity Expenses • Corruption of Data • Recovery Expenses • Failure to Meet Contracts • Failure to Meet Privacy Regulations • Illegal User Activity • Director Liability
But Symantec Can Help….. Security Data Protection For all network tiers: the gateway, the server, the desktop, including PCs, laptops, handhelds Backup and recovery of data and systems Data Center Management Services Full range of services to assist our customers manage and mitigate IT risk Simplifies administration of heterogeneous environments and provides continuous availability of mission critical data and applications Plan Design Build Manage
A Simple Blueprint For Windows Security And Availability Policy • Proactive alerts • Endpoint compliance • Email discovery/compliance System • Server management & recovery • Desktop management & recovery Data • Data backup and recovery • Client and server security Application • Mail security • Exchange archiving
Symantec’s Resources For Small Business http://www.symantec.com/small_business/
Recommended Practices • Prevent infection with antivirus and antispyware software • Install antivirus on all desktops, laptops, and servers • Check for virus definitions daily or set for automatic updates • Stop intruders with a firewall • Use a firewall on all desktops, laptops, and servers • Stay on top of security updates • Deploy security patches and fixes as soon as they are available • Use the latest operating system versions • Create strong passwords and change them frequently • Don’t allow Web browsers to remember passwords/private data • Open email responsibly • Scrutinize attachments before opening them; avoid ones with unusual extensions • Don’t open or reply to unsolicited mail
Recommended Practices, cont. • Browse the Web with caution • Don’t ever give personal information to a Web site unless you see a small padlock or key icon in the browser’s toolbar • Don’t type confidential information in Instant Messaging/Chat programs • Back up your desktops and servers regularly • Back up vital data daily and store critical backups offsite • Make remote connections secure • Require remote users to use antivirus and firewall software • Use a Virtual Private Network (VPN) • Lock down wireless networks • Install a firewall at the wireless access point • Ensure the physical security of your equipment • Never leave wireless devices unattended • Use the screen locking feature when you leave your computer