110 likes | 123 Views
XAHIVE LLC provides comprehensive cybersecurity and privacy assessment services, helping organizations safeguard their data and communication. Co-founded by David Mohajer & Sem Ponnambalam, we prioritize secure communication, encryption tools, and awareness to prevent data breaches. Our governance framework emphasizes organizational structure, security culture, and cybersecurity governance. Contact us to assess your security status quo and implement preventive measures against data loss.
E N D
XAHIVE International LLC Ottawa • New York Comprehensive Secure Communication, Cybersecurity and Privacy Assessment Services Co-founders: David Mohajer & Sem Ponnambalam
Top 10 Healthcare data breaches in 2015 Source: Forbes - http://www.forbes.com/sites/danmunro/2015/12/31/data-breaches-in-healthcare-total-over-112-million-records-in-2015/#2715e4857a0b6c2d393e7fd5 Total: 111 Million (almost 35% U.S. Population)
Cybersecurity Budget “At a minimum, 10% of the IT budget should be earmarked for the cybersecurity fundamentals.” Ponemon Institute, 2015 Cybersecurity fundamentals: • Education • Secure communication and encryption tools TechValidate Survey, 2015
Increasing Knowledge & Raising Awareness Human error accounts for 30% of data loss. Increasing the awareness amongst end users is crucial. • Set up security compliance-related policies for all computer users • Increase education and awareness • Create an adequate communications plan in the event of a breach Source: http://gbr.pepperdine.edu/2010/08/the-cost-of-lost-data/
Cybersecurity Governance Governance Framework: • Organizational structure • Work culture • Security Awareness • Cybersecurity governance Managing how the people, the applications and infrastructure interact.
Everyone is Responsible for Cybersecurity • People • Training • Skills and Qualifications • Process • Management • Governance • IT Audits • Technology • Modern • Support deployment
What is your Status Quo? Do you have systems and processes in place that 1. Involve high risk data? 2. Cannot be secured or audited?
How is your data managed? Personal vs. Public information Data access Auditing Mission critical data
Classify your Data Determine the threat level of the data being breached Determine the cost of auditing the data Determine how often access and control of the data changes
Prevent Data Loss Policy review • Deterrents • Planned responses • Automated checks and balances
Thank You! 347 Fifth Avenue. New York, New York, 10016 sales@xahive.com 646-205-2246