120 likes | 218 Views
Security Strategies. By Debbie Flemming, MCSE, CSSA Communications Network Engineer. Overview. Access Risks for your Company How to protect those Risks How to protect your internal Network from the WAN. THREATS Attacks from viruses, Trojans, or other malware
E N D
Security Strategies By Debbie Flemming, MCSE, CSSA Communications Network Engineer
Overview • Access Risks for your Company • How to protect those Risks • How to protect your internal Network from the WAN
THREATS • Attacks from viruses, Trojans, or other malware • Unauthorized access to computer systems • Insider abuse of network resources. • This includes problems such as using the internet for • non-work related access or downloading unlicensed software
RISK ASSESSMENT • What data and applications are most valuable to your organization? • Where do your most valuable data and applications reside? • What will the impact from a loss of data or applications, • such as downtime caused by the virus attach? • What is the most cost effective way to address the risks?
Protect Desktops and Servers • Reduce time and labor costs for deployment of operating systems, • software, and updates • Fewer conflicts between applications due to more uniform environment • Increased use productivity due to reduced downtime from • malicious attacks or software
Protect your LAN • Update operating systems and software • Use anti-malware software • Protect Your Data – Data Backup • Take advantage of Directory Services • Protect Documents with rights management
Firewall VPN Server Internet Telecommunter VPN’s for Telecommuters
Summary • Risk Management • Protect Desktops and Servers • Protect Networks