Will Your Business Get Hacked in 2016?

Preview:

Citation preview

1

2

Large Companies

81%£600k - £1.5m

Small Companies

60%£65k - £115k

Large Companies

90%£1.46m - £3.14m

Small Companies

75%£75k - £311k

3

2016: The year of the bigger problems?

4

4,000 data breaches in 3 yearsComputing.co.uk

5

Over 170 law firms investigated in 1 year

Computing.co.uk

6

ALL major UK banks and lenders reported data breaches

Computing.co.uk

7

¾ of customers would reconsider using a company

Computing.co.uk

8

Who’s to blame?

9

159,959 accounts compromisedComputing.co.uk

Nearly 300,000 customers lost

10

Total cost £40- £45 million Computing.co.uk

£15 million lost in trading value

11

BT picked up 40% of unhappy customers

Computing.co.uk

12

5.5 million things connected every day

1

20

15

10

5

Billi

ons

2001 20202014

1.2B

20.8B

6.4B

2016

13

“For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe.”Tim Cook, CEO of Apple

14

Up to 35% would Sell company information

Computing.co.uk

15

Passwords…

1. 1234562. password3. 123456784. qwerty5. 12345

6. 1234567897. football8. 12349. 123456710. baseball

11. welcome 12. 123456789013. abc12314. 11111115. 1qaz2wzx

16. dragon17. master18. monkey19. letmein20. login

16

“Two things are infinite: The universe and human stupidity, and I’m not so sure about the former.”

- Albert Einstein

17

Trends

Security Breaches on the rise

18

Firewall

Web

Email

Wireless

Reducing the threat - Protect

Endpoint

Encryption

Server

MobileInsight & Analysis

Better Protection

Intelligence Sharing

18

19

IT Control

Configuration

Visibility

19

Reducing the threat - Control

20

Reducing the threat - Educate

Passphrases not passwords

Think before you click

Verify the call

21

Layered defense & automation

Analytics

Next-Gen Firewall

Wireless

Web

Email

Disk Encryption

UTM

File Encryption

Endpoint

Next-Gen Endpoint

Mobile

Server

Cloud Intelligence

Centralized Policy Management

22

Will your business get hacked?

8 June 2016

23

rollits.com

How can you help to protect

yourself against your weakest

link?

Your Employees!

24

rollits.com

Cybercriminals use social Engineering

 No longer kids in their bedroom

This is serious organised crime

25

rollits.com

26

rollits.com

Employers have a duty to train employees• Tell them○ Be vigilant, if something looks strange be cautious○ Be aware of Spoofing○ Are you expecting it?○ Would you expect more/less detail?○ Do not click the link in an unexpected email○ Browse on safer devices if possible (such as tablets)

27

rollits.com

At home …• Keep anti-virus software up to

date• Ensure your firewall is turned

on and up to date• Keep your devices operating

system and Apps/Programs up to date

• Browse using a tablet (only download apps from official app stores (Google/Apple)

• Be cautious!

28

rollits.com

Browsing at work because we keep security system up to date can be not safe. Key in web site addresses, don’t click

on links to them

29

rollits.com

Criminals gain trust of employees

Trust is power to the criminals

Everyone from receptionist to MD/Chairman is duped

30

rollits.com

What if an employee causes a security breach?What action can be taken?• Misconduct?• Incompetence?

31

rollits.com

What loss has been suffered?

Carry out a proper investigation to establish the facts.

Look at the training record.

Apply appropriate sanction following a disciplinary/ capability hearing with employee.

32

rollits.com

I Quit!!

33

rollits.com

Employee walks out of the door with your most valuable assets:Customer lists / supplier lists / pricing structure / business strategy /

trade secrets / product informationWhat can an employer do to protect itself?

34

rollits.com

Look at disciplinary rules and procedure whilst in employment

Look to the contract if an employee quitsPost-termination restrictions

Must be drafted correctly“No wider than necessary”

“Legitimate business interest to protect”

Take legal advice before drafting

35

rollits.com

No contract?

More difficult

Cannot prevent competing without express

contractual provisions

Cannot prevent solicitation

Employee is free to use employer’s information

36

rollits.com

Policies & proceduresForwarding to home email

Printing/copyingLeaving things in cars/bags/trains

Be clear that all of the above are misconduct

37

rollits.com

Be prepared and you can strengthen your weakest link!

38

rollits.com

Any Questions?

39

rollits.com

Ed Jenneson01482 337341

edward.jenneson@rollits.com

Recommended