1 / 0

Security From the Inside Out in a Digital Age

Security From the Inside Out in a Digital Age. Califorensics Don Vilfer, JD, ACE 916-789-1602 Don@Califorensics.com www.Califorensics.com. WHY DO WE CARE ABOUT SECURITY?. Loss of information has dire consequences to your business. You need to take some simple steps to prevent damage.

yoland
Download Presentation

Security From the Inside Out in a Digital Age

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security From the Inside Out in a Digital Age

    Califorensics Don Vilfer, JD, ACE 916-789-1602 Don@Califorensics.com www.Califorensics.com
  2. WHY DO WE CARE ABOUT SECURITY? Loss of information has dire consequences to your business. You need to take some simple steps to prevent damage. You need to have a response plan to theft or an attack.
  3. Realities of Today’s Business that Bring New Challenges? BYOD. Expectations of the public to get information. Cloud storage. Removable Media (CD, DVD, USB drives). Volume of Data. Mean People.
  4. PHONES ARE MORE PREVALENT THAN COMPUTERS Some Statistics No. of Phone % of Pop Computers China 1.1B 75% 53M India 900M 74% 60M US 327M 104% 223M
  5. Threats from the Inside Trade Secret Theft. Embarrassment to the Company. Embezzlement. Blackmail.
  6. Threats from the Outside Trade Secret Theft. Embarrassment to the Company. Hackers and Data Loss. DDOD Attacks (prepare, communicate, respond and block).
  7. FORENSIC PROCESSES (What can a response cover?) Review information on the drive Recover deleted files. Data Carving. Searches in free space. Recovering web-based e-mail. Determining activities on the computer (copying, printing, deleting, burning). Break passwords and encryption.
  8. Questions?

    Califorensics Don Vilfer, JD, ACE 916-789-1602 Don@Califorensics.com www.Califorensics.com
More Related