1 / 49

Secure Your Business: Technology Partners and Cybersecurity Myths

Learn how to protect your business from cybercrime and choose the right technology partners. Explore common cybersecurity myths and misconceptions and discover essential strategies such as web filtering, education, backups, physical security, and access control.

kylec
Download Presentation

Secure Your Business: Technology Partners and Cybersecurity Myths

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How to keep your Business Secure and pick the right Technology Partners • May 19, 2017 • Manuel Bautista

  2. You’re not a FIREFIGHTER!!!

  3. Cybercrime damages cost the world $3 trillion last year alone, according to a recent report from Cybersecurity Ventures, and that figure is expected to double by 2021

  4. 2016 US Known Breaches

  5. Wannacry Ransomware

  6. Myths and Misconceptions • This is a technology problem. • Small or medium businesses are not going to be attacked. • I don’t have anything worth stealing.

  7. Myths and Misconceptions • Mac and Linux systems are invulnerable. • I don’t go to dangerous sites, so I am safe. • All my virus software is up to date, I am safe. • We have a firewall, I am safe.

  8. Myths and Misconceptions • We don’t have the money to implement a cybersecurity program.

  9. Web Filtering

  10. Education

  11. Backups

  12. Wannacry Ransomware

  13. Backups

  14. Physical Security

  15. Access Control

  16. NEARLY EVERY MAJOR SECURITY BREACH STARTS WITH AN INSIDER, OR AN ATTACKER USING AN INSIDER’S CREDENTIALS. • 2015 was a banner year for insider threats. It’s estimated that the average organization suffered from 3.8 insider attacks last year and 45% of businesses can’t tell if they’ve suffered a breach.

  17. Governance

  18. Endpoint Security Firewall Antivirus Patch Management

  19. Spam Filtering

  20. W.E.B.P.A.G.E.S • Web Filtering • Education • Backups • Physical Security • Access Control • Governance • Endpoint Security • Spam Filtering

  21. Family • Business/Intellectual Property

  22. Fire Alarm • Antivirus

  23. Important Documents • Off-Site Backups

  24. Evacuation Plan • Education/Governance

  25. Meth Lab Fires • Hackers

  26. W.E.B.P.A.G.E.S • Web Filtering • Education • Backups • Physical Security • Access Control • Governance • Endpoint Security • Spam Filtering

  27. You’re not a FIREFIGHTER!!!

  28. Managed Service Provider

  29. Questions to ask a MSP • Do you follow industry standards and best practices? • Are your technicians certified in the solutions and services you provide?

  30. Questions to ask a MSP • Do you have experience serving other clients in our industry and of the same business size? • Do you have enough resources to serve us effectively and in a timely manner?

  31. Questions to ask a MSP • What are your normal business hours and what is your availability outside of those hours? • Do you only provide remote services or is onsite a different rate? • Are you based in the United States or overseas?

  32. Questions to ask a MSP • Do you properly document work so that you have accurate and complete records? (Samples)

  33. ‘as a Service’ Providers

  34. ‘as a Service’ Q/A • Who owns your data?

  35. ‘as a Service’ Q/A • What kind of API integration is available?

  36. ‘as a Service’ Q/A • What is your licensing model? • What is your length of contract?

  37. ‘as a Service’ Q/A • Reporting and Business Intelligence.

  38. Thank You • @manuelivr • http://theagilec.io • http://www.linkedin.com/in/manuelbautista

More Related