28
ALL COVERED SECURITY SERVICES

Protecting Your Business - All Covered Security Services

Embed Size (px)

DESCRIPTION

All Covered is a nationwide provider of IT services and security. This presentation highlights the most essential factors that businesses need to be aware of when implementing their security plan. It shows how any company, regardless of size, is at risk with external, and internal, security threats. Whether you own a small, medium, or large business, IT security should be at the forefront of any discussion. It is better to be proactive and prevent an attack from happening than having to pick up the pieces after the damage has already been done to your business.

Citation preview

Page 1: Protecting Your Business - All Covered Security Services

ALL COVERED

SECURITY SERVICES

Page 2: Protecting Your Business - All Covered Security Services

2

About All Covered

All Covered – IT services from Konica Minolta

Established in 1997

Headquartered in Foster City, California

Offices in over 25 cities in the United States

Over 800 employees with approximately 600 engineers with industry certifications

Page 3: Protecting Your Business - All Covered Security Services

3

Protecting Your Business

IT Security Challenges:

Malware/Spyware Data Loss / Disasters

Not Having a Plan

Page 4: Protecting Your Business - All Covered Security Services

4

Is Your Business at Risk?

Without internal security and data recovery precautions, businesses put revenue, reputation, compliance, and innovation at huge risk…

Page 5: Protecting Your Business - All Covered Security Services

5

Don’t Be a Target!

The Target data breach affected 40 million debit and credit cards and 70 million customer records

The Target breach incident went unnoticed

for almost a month!!

Page 6: Protecting Your Business - All Covered Security Services

6

Security & Your Business

You don’t need to be a company the size of Target to be impacted by a security breach…

“In 2014, 40% of small and mid-size businesses that manage their own security will have their network accessed by a hacker, and more than 50% won’t even know they were attacked”.

Page 7: Protecting Your Business - All Covered Security Services

7

Common Security Challenges

Going at it alone can be very demanding….

IT Responsibilities:

• Messaging Protection• Website security• Web Content Filtering• Virus Definitions• Patching• Backup and recovery• BYOD policy

• Compliance management

Page 8: Protecting Your Business - All Covered Security Services

8

Why Businesses Might Need - Assistance

• Installing firewalls and antivirus on your PCs is not enough…cyber attacks can still get through and go unnoticed.

• Security responsibilities often fall to IT generalists who are also tasked with managing servers and other applications

• Many organizations lack the SKILLS, TIME, RESOUCES, and EXPERTISE to properly deploy and maintain the technological side of IT security

Page 9: Protecting Your Business - All Covered Security Services

What if your Business was Attacked?

• Do you have a way to detect cyber-attacks?

• Do you know what to do if your data was hacked or stolen?

• What would you do if a virus spread to every one of your servers and PCs?

Recent Attacks

9

Page 10: Protecting Your Business - All Covered Security Services

10

Types of Security Threats

• Malware • Spyware• Adware• Phishing• Data Theft

• Ransomware• Viruses• Password hacking• Vulnerability Scanners• Packet Sniffers

And don’t forget about: Insider Activity

Criminals use a number of tactics to gain access to your data. Among the most common tactics are:

Page 11: Protecting Your Business - All Covered Security Services

11

Success Stories - SecurityDisaster Recovery

– Problem: • Ransomeware introduced to IT environment via phishing email• Accounting and Financial systems were encrypted• Client had not confirmed backup for weeks• Data stored on Accounting laptop was not part of backup• Client had to pay a ransom to decrypt files• 4 Days to resolve

– Billing, Timesheets, Payroll, Email all impacted

– Solution: • Deployed All Covered backup for servers• Deployed All Covered backup for workstations• Deployed All Covered Email Protection Services

– Benefit:• Automated server backups with offsite copy• Server backups managed and monitored from the All Covered

NOC (Network Operations Center) • Data on laptops is now backed up to the cloud• Email is now protected with antispam, antivirus and phishing

protection.

Software Company

Location: Chicago, IL

Established: 1992

Description:

Over 700 employees and 3 offices in the Chicago Area

Page 12: Protecting Your Business - All Covered Security Services

12

Success Stories - SecurityRecurring Virus and Malware Infections

– Problem: • Multiple virus and malware infections introduced via phishing

emails and malicious links• Various servers and workstations infected and re- infected

over several months• Several hours to resolve each time

– Email, File storage, business applications where impacted over the various infections

– Solution: • Setup Email Spam Filtering and Antivirus• Deployed Malware prevention• Setup DNS filtering

– Benefit: • Reduced the reoccurrence of virus and malware infections. • Improved employee confidence in IT systems. • Improved employee productivity.

Accounting Firm

Location: Atlanta

Established: 1998

Description:

Over 150 employees and 4 offices in the Atlanta area

Page 13: Protecting Your Business - All Covered Security Services

13

Success Stories - SecurityVulnerability Scanning

– Problem: • Required to have periodic vulnerability scans to meet HIPAA

compliance• Client was looking for a managed solution as they did not

have internal expertise to deploy and manage an on-premise solution

• Out of compliance without this solution

– Solution: • Deployed Managed Vulnerability Scan Service

– Benefit:• Provides automated monthly vulnerability scans and reports

Healthcare Provider

Location: San Jose, CA

Established: 1989

Description:

Small provider with 2 offices and 20 employees

Page 14: Protecting Your Business - All Covered Security Services

All Covered Security Services

Messaging Protection Email Antivirus Spam Filtering Email Continuity Email Encryption Phishing Protection

Endpoint Protection Managed Antivirus Managed Malware Protection DNS Filtering Web Content Filtering

Patching Managed Microsoft Patching

Vulnerability Management Managed Vulnerability Scan Service

All Covered will secure client environments using the following ACC services:

14

Page 15: Protecting Your Business - All Covered Security Services

15

Additional Threats to Consider

Unfortunately, threats to your business are not only security breaches and cyber attacks; your business can also fall victim to…DATA LOSS.

Page 16: Protecting Your Business - All Covered Security Services

16

What if You Lost Your Data?

Do you have a data backup system in place?

If your entire building burned down or all of your servers crashed, would your business be able to recover?

Page 17: Protecting Your Business - All Covered Security Services

17

Types of Data Loss Threats

• Fires• Floods• Earthquakes• Hurricanes• Tornadoes

• Data Corruption• Hardware/System Malfunction• Software corruption• Human error• Brownouts• Theft

Page 18: Protecting Your Business - All Covered Security Services

18

Data Loss Statistics

Every week, 140,000 hard drives crash in the United States and 31% of PC users have lost all of their files due to events beyond their control.

Page 19: Protecting Your Business - All Covered Security Services

19

Success Stories – Data BackupDisaster Recovery

– Problem: • Fire in an adjacent building

– Solution: • All Covered Backup for Servers

– Business Continuity in the Cloud

– Benefit:• Servers damaged by water and

smoke replaced by virtual cloud servers in under 2 hours

• Access to building was lost, but full access to systems and data in the cloud was uncompromised

Location: Des Moines, Iowa

Established:1888

Description: • Community development

organization servicing central Iowa

• 21 affiliate chambers of commerce

• 5,000 business members

Community Development Company

Page 20: Protecting Your Business - All Covered Security Services

Data Backup and Recovery Services

Managed Backup and Recovery Physical Servers Virtual Servers PCs and Laptops

Email Protection Archiving

Cloud Services Cloud Assessments Cloud Hosting

All Covered will provide protection of client data via the following ACC services:

20

Page 21: Protecting Your Business - All Covered Security Services

21

Additional Security Measures: Cloud Services

Benefits and features:• 24x7 Availability & Reliability

• Remote access from any location

• Predictable monthly costs

• Ability to quickly scale up or down

Looking for an extra layer of security? Consider the Cloud!

All Covered Cloud Services include:

• Fully managed virtual servers located in the U.S.

• Cloud Backup and Disaster Recovery

• Cloud Hosted Exchange

• Cloud Business Continuity

Page 22: Protecting Your Business - All Covered Security Services

Success Stories - CloudRisk Mitigation & Regulatory Compliance

22

– Problem: • Locations with aging infrastructure, intermittent Internet

and unreliable power caused major outage. All 6 branches lost access to the network and internet for several days.

– Solution: • All Covered Cloud Servers and co-location

– Benefit:• Eliminated need to purchase new servers for

secondary locations

• Reliable power to all centrally located servers while removing need to purchase backup power

• Achieved compliance conditions

Location: Troy, Michigan

Established: 1911

Description:

Community bank with 6 branches. Dedicated to meeting the financial needs of local residents and businesses.

Community Bank

Page 23: Protecting Your Business - All Covered Security Services

23

What Are the Steps You Can Take?

• There is a saying in the medical profession, “Prevention is the Best Medicine.” The same can be said for information security.

• Businesses can overcome internal and external threats by seeking professional services from outside security experts:

A third-party security assessment gives organizations a holistic look at their technology, policies, and practices around information security.

Page 24: Protecting Your Business - All Covered Security Services

24

All Covered Can Help

• Step 1: Plan: Build a comprehensive security plan that includes BYOD, malware and virus protection, and data security.

• Step 2: Secure: Put the right safeguards into action including - hosted AV, vulnerability management, endpoint protection, network monitoring, and patching.

• Step 3: Protect: Implement ongoing managed protection of data, PCs, and servers (both on-site and in the cloud) for quick and reliable recovery

Page 25: Protecting Your Business - All Covered Security Services

25

Managed Vulnerability Scanning

Vulnerability Scanning Service

Scanning of all internal/external IPs Performed Monthly Obtain license assigned by All Covered Submit ACC contract for total number of IPs

to scan

Vulnerability Report Includes:

Executive summary Discovered Hosts Discovered Hosts with vulnerabilities Vulnerability details Recommended solution(s)

Page 26: Protecting Your Business - All Covered Security Services

26

Steps You Can Take Now

Data Backup and Recovery

• Identify data that needs to be backed up• Move those files to your server• Decide on storage method:

disk vs. tape, or both• Get data offsite

Users and Networks

• Protect your data from your employees• Protect your employees from themselves• Educate employees on threats• Communicate policies and procedures• Remove password sticky notes from all monitors

Page 27: Protecting Your Business - All Covered Security Services

27

Steps You Can Take Now

Security Management

• Centralize Management• Institute monitoring and reporting• Enforce policy across all layers• Consider Outsourcing

Data Access

• Understand where your network begins and ends• Secure the entire perimeter of your network• Define and enforce policies• Inspect and filter all traffic in and out of your network

Page 28: Protecting Your Business - All Covered Security Services

28

Appendix

“40% of small to medium businesses who manage their own network and use the Internet for more than e-mail will have their network accessed by a hacker and more than 50% won’t even know they were attacked” (Source: Gartner Group)

“Every week, 140,000 hard drives crash in the United States and 31% of PC users have lost all of their files due to events beyond their control” (Source: Mozy Online Backup)

For more information please visit:

http://www.allcovered.com/ or http://www.allcovered.com/learning/

Social presence:

Twitter: @allcovered

Facebook: https://www.facebook.com/allcovered

LinkedIn: http://www.linkedin.com/company/all-covered

Google+: https://plus.google.com/+Allcovered-IT-service/about