Protecting Your Business

Preview:

Citation preview

1

PROTECTING YOUR BUSINESS

All Covered Seminar

2

Today’s Presenter:

ABOUT ALL COVERED

Tim Coker, GCFE, CHP, CSCS Information Security Practice Manager

Over twenty years of experience in network and systems administration, engineering, security, digital

forensics, technical consulting, and design & management. Currently directing all security program

management, compliance, and security services for clients and internally for All Covered.

• All Covered – IT services from Konica Minolta

• Established in 1997

• Headquartered in Foster City, California

• Offices in over 25 cities in the United States

• Over 800 employees with approximately 600 engineers with industry certifications

3

IT Security Challenges:

PROTECTING YOUR BUSINESS

Not Having a Plan

Malware / Spyware

Data Loss / Disasters

4

IS YOUR BUSINESS AT RISK?

Without internal security and data recovery precautions, businesses

put revenue, reputation, compliance and innovation at huge risk…

Revenue

Reputation

Compliance

Innovation

5

DON’T BE A TARGET!

The Target data breach affected 40 million debit and credit cards

and 70 million customer records.

The Target breach incident went

unnoticed for almost a month!

6

SECURITY & YOUR BUSINESS

You don’t need to be a company the size of Target to be impacted

by a security breach…

“In 2014, 40% of small and mid-size

businesses that manage their own

security will have their network

accessed by a hacker, and more

than 50% won’t even know they

were attacked.”

7

COMMON SECURITY CHALLENGES

Going it alone can be very demanding…

IT RESPONSIBILITIES:

• End User Support

• Messaging Protection

• Website Security

• Web Content Filtering

• Virus Definitions

• Patching

• Backup and Recovery

• Mobile Devices and BYOD

• Compliance Management

8

WHY BUSINESSES MIGHT NEED ASSISTANCE

• Installing firewalls and antivirus on your PCs is

not enough…cyber attacks can still get through

and go unnoticed.

• Security responsibilities often fall to

IT generalists who are also tasked with

managing servers and other applications.

• Many organizations lack the SKILLS, TIME,

RESOURCES and EXPERTISE to properly

deploy and maintain the technological side

of IT security.

9

TYPES OF SECURITY THREATS

Criminals use a number of tactics to gain access to your

data. Among the most common tactics are:

• Malware

• Spyware

• Adware

• Phishing

• Data Theft

• Ransomware

• Viruses

• Password Hacking

• Vulnerability Scanners

• Packet Sniffers

And don’t forget about

Insider Activity

10

ALL COVERED SECURITY SERVICES

All Covered will secure client environments using the following

‘All Covered Care’ services:

MESSAGING PROTECTION

• Email Antivirus

• Spam Filtering

• Email Continuity

• Email Encryption

• Phishing Protection

ENDPOINT PROTECTION

• Managing Antivirus

• Managed Malware Protection

• DNS Filtering

• Web Content Filtering

PATCHING

• Managed Microsoft Patching

VULNERABILITY MANAGEMENT

• Managed Vulnerability Scan Service

11

SUCCESS STORIES – SECURITY Recurring Virus and Malware Infections

Location: Atlanta

Established: 1998

Description: Over 150

employees and 4 offices in the

Atlanta area

ACCOUNTING FIRM

PROBLEM:

• Multiple virus and malware infections introduced via phishing emails and malicious links

• Various servers and workstations infected and re-infected over several months

• Several hours to resolve each time

• Email, file storage, business applications where impacted over the various infections

SOLUTION:

• Deployed Email Spam Filtering and Antivirus

• Deployed Malware prevention

• Deployed DNS filtering

BENEFITS:

• Reduced the reoccurrence of virus and

malware infections

• Improved employee confidence in IT systems

• Improved employee productivity

12

SUCCESS STORIES – SECURITY Vulnerability Scanning

Healthcare Provider

PROBLEM:

• Required to have periodic vulnerability scans to

meet HIPAA compliance

• Client was looking for a managed solution as they

did not have internal expertise to deploy and

manage an on-premise solution

• Out of compliance without this solution

SOLUTION:

• Deployed Managed Vulnerability Scan Service

BENEFITS:

• Provides automated monthly vulnerability scans

and reports

• Continues to help client discover and remediate new

vulnerabilities in the environment

• Helps client meet compliance requirements

Location: San Jose, CA

Established: 1989

Description: Small

provider with 2 offices

and 20 employees

13

ADDITIONAL THREATS TO CONSIDER

Unfortunately, threats to your business are not only security

breaches and cyber attacks; your business can also fall victim

to…DATA LOSS.

?

14

WHAT IF YOU LOST YOUR DATA?

Do you have a data backup system in place?

If your entire building burned down or all of your servers

crashed, would your business be able to recover?

15

TYPES OF DATA LOSS THREATS

• Fires

• Floods

• Earthquakes

• Hurricanes

• Tornadoes

• Data Corruption

• Hardware / System Malfunction

• Software Corruption

• Human Error

• Brownouts

• Theft

16

DATA LOSS STATISTICS

Every week, 140,000 hard drives crash in the United States and

31% of PC users have lost all of their files due to events beyond

their control.

17

DATA BACKUP AND RECOVERY SERVICES

All Covered will provide protection of client data via the following

‘All Covered Care’ services:

MANAGED BACKUP AND RECOVERY

• Physical Servers

• Virtual Servers

• Server Files

• PCs and Laptops

EMAIL PROTECTION

• Archiving

CLOUD SERVICES

• Cloud Assessments

• Cloud Hosting

18

SUCCESS STORIES – DATA BACKUP Disaster Recovery

Greater Des Moines Partnership

PROBLEM:

• Fire in an adjacent building

• Smoke and water damage to their systems

SOLUTION:

• All Covered Backup for Servers

• With Business Continuity in the Cloud

BENEFITS:

• Servers damaged by water and smoke replaced by

virtual cloud servers in under 2 hours

• Access to building was lost, but full access to systems

and data in the cloud was uncompromised

Location: Des Moines, Iowa

Established: 1888

Description:

• Community development

organization servicing

central Iowa

• 21 affiliate chambers

of commerce

• 5,000 business members

19

SUCCESS STORIES – SECURITY & DISASTER RECOVERY Email Protection and Disaster Recovery

Location: Chicago, IL

Established: 1992

Description: Over 100

employees and 3 offices in the

Chicago area

Software Company

PROBLEM:

• Ransomware introduced to IT environment via phishing email

• Accounting and Financial systems were encrypted

• Client had not confirmed backup for weeks

• Data stored on Accounting laptop was not part of backup

• Client had to pay a ransom to decrypt files

• 4 Days to resolve

• Billing, Timesheets, Payroll, Email all impacted

SOLUTION:

• Deployed All Covered Email Protection Services

• Deployed All Covered backup for servers

• Deployed All Covered backup for workstations

BENEFITS:

• Email is now protected with antispam, antivirus and phishing protection

• Automated server backups with offsite copy

• Server backups managed and monitored from the

All Covered NOC (Network Operations Center)

• Data on laptops is now backed up to the cloud

20

ADDITIONAL SECURITY MEASURES:

CLOUD SERVICES

Looking for an extra layer of security? Consider the cloud!

ALL COVERED CLOUD SERVICES INCLUDE:

• Fully managed virtual servers located in the U.S.

• Cloud backup and disaster recovery

• Cloud hosted exchange

• Cloud business continuity

BENEFITS AND FEATURES:

• 24x7 availability and reliability

• Remote access from any location

• Predictable monthly costs

• Ability to quickly scale up or down

Cloud ROI Return on Investment Curve for Cloud Solutions

21

SUCCESS STORIES – CLOUD Risk Mitigation & Regulatory Compliance

Clarkston State Bank

PROBLEM:

• Locations with aging infrastructure, intermittent

internet and unreliable power caused major outage.

All 6 branches lost access to the network and

internet for several days.

SOLUTION:

• All Covered Cloud Servers and co-location

BENEFITS:

• Eliminated need to purchase new servers for

secondary locations

• Reliable power to all centrally located servers

while removing need to purchase backup power

• Achieved compliance conditions

Location: Clarkston, Michigan

Established: 1911

Description: Community bank

with 6 branches in Oakland

County, Michigan. Dedicated to

meeting the financial needs of

local residents and businesses.

22

ALL COVERED CAN HELP

• Step 1 – Plan: Build a comprehensive

security plan that includes written policies

for BYOD, malware and virus protection,

and data security.

• Step 2 – Secure: Put the right

safeguards into action including

email protection, endpoint protection,

network monitoring, patching and

vulnerability management.

• Step 3 – Protect: Implement ongoing

managed protection of data, on PCs and

servers (both on-site and in the cloud) for

quick and reliable recovery.

22

23

STEPS YOU CAN TAKE NOW

SECURITY MANAGEMENT

• Deploy Centralized Managed Endpoint Security

• Institute automated patch management

• Create and enforce IT and Security policies across all layers

DATA ACCESS AND PROTECTION

• Understand where your data resides

• Identify data that needs to be backed up regularly

• Make sure you have copies off-site

• Secure the entire perimeter of your network

• Institute secure remote access

USERS

• Educate employees

• Communicate policies and procedures

• Consider Web Content Filtering

CONSIDER OUTSOURCING

24

NETWORK AND SECURITY ANALYSIS OFFER

STEPS FOR MOVING FORWARD

• Contact your local sales rep or call 866.446.1133

• Authorization form signed and submitted

• Analysis scan performed on your network

• Review Network Risk Report with an

All Covered Solutions Architect

NETWORK ANALYSIS RISK REPORT INCLUDES:

• List of analysis tasks performed

• Risk score from 1-100

• Issues Summary with recommended solutions

• Asset Summary

• User Summary

**Complimentary Network and Security Analysis ($1,000 Value)

Network

and

Security Analysis

View Sample Report: http://allcovered.com/security/report

25

QUESTIONS?

To speak with an All Covered

Services Consultant, call:

866-446-1133

Or visit:

http://www.allcovered.com/

26

APPENDIX

“40% of small to medium businesses who manage their own

network and use the Internet for more than e-mail will have their

network accessed by a hacker and more than 50% won’t even

know they were attacked” (Source: Gartner Group).

“Every week, 140,000 hard drives crash in the United States and

31% of PC users have lost all of their files due to events beyond

their control” (Source: Mozy Online Backup).

Recommended