Upload
all-covered
View
55
Download
0
Tags:
Embed Size (px)
DESCRIPTION
All Covered is a nationwide provider of IT services and security. This presentation highlights the most essential factors that businesses need to be aware of when implementing their security plan. It shows how any company, regardless of size, is at risk with external, and internal, security threats. Whether you own a small, medium, or large business, IT security should be at the forefront of any discussion. It is better to be proactive and prevent an attack from happening than having to pick up the pieces after the damage has already been done to your business.
Citation preview
ALL COVERED
SECURITY SERVICES
2
About All Covered
All Covered – IT services from Konica Minolta
Established in 1997
Headquartered in Foster City, California
Offices in over 25 cities in the United States
Over 800 employees with approximately 600 engineers with industry certifications
3
Protecting Your Business
IT Security Challenges:
Malware/Spyware Data Loss / Disasters
Not Having a Plan
4
Is Your Business at Risk?
Without internal security and data recovery precautions, businesses put revenue, reputation, compliance, and innovation at huge risk…
5
Don’t Be a Target!
The Target data breach affected 40 million debit and credit cards and 70 million customer records
The Target breach incident went unnoticed
for almost a month!!
6
Security & Your Business
You don’t need to be a company the size of Target to be impacted by a security breach…
“In 2014, 40% of small and mid-size businesses that manage their own security will have their network accessed by a hacker, and more than 50% won’t even know they were attacked”.
7
Common Security Challenges
Going at it alone can be very demanding….
IT Responsibilities:
• Messaging Protection• Website security• Web Content Filtering• Virus Definitions• Patching• Backup and recovery• BYOD policy
• Compliance management
8
Why Businesses Might Need - Assistance
• Installing firewalls and antivirus on your PCs is not enough…cyber attacks can still get through and go unnoticed.
• Security responsibilities often fall to IT generalists who are also tasked with managing servers and other applications
• Many organizations lack the SKILLS, TIME, RESOUCES, and EXPERTISE to properly deploy and maintain the technological side of IT security
What if your Business was Attacked?
• Do you have a way to detect cyber-attacks?
• Do you know what to do if your data was hacked or stolen?
• What would you do if a virus spread to every one of your servers and PCs?
Recent Attacks
9
10
Types of Security Threats
• Malware • Spyware• Adware• Phishing• Data Theft
• Ransomware• Viruses• Password hacking• Vulnerability Scanners• Packet Sniffers
And don’t forget about: Insider Activity
Criminals use a number of tactics to gain access to your data. Among the most common tactics are:
11
Success Stories - SecurityDisaster Recovery
– Problem: • Ransomeware introduced to IT environment via phishing email• Accounting and Financial systems were encrypted• Client had not confirmed backup for weeks• Data stored on Accounting laptop was not part of backup• Client had to pay a ransom to decrypt files• 4 Days to resolve
– Billing, Timesheets, Payroll, Email all impacted
– Solution: • Deployed All Covered backup for servers• Deployed All Covered backup for workstations• Deployed All Covered Email Protection Services
– Benefit:• Automated server backups with offsite copy• Server backups managed and monitored from the All Covered
NOC (Network Operations Center) • Data on laptops is now backed up to the cloud• Email is now protected with antispam, antivirus and phishing
protection.
Software Company
Location: Chicago, IL
Established: 1992
Description:
Over 700 employees and 3 offices in the Chicago Area
12
Success Stories - SecurityRecurring Virus and Malware Infections
– Problem: • Multiple virus and malware infections introduced via phishing
emails and malicious links• Various servers and workstations infected and re- infected
over several months• Several hours to resolve each time
– Email, File storage, business applications where impacted over the various infections
– Solution: • Setup Email Spam Filtering and Antivirus• Deployed Malware prevention• Setup DNS filtering
– Benefit: • Reduced the reoccurrence of virus and malware infections. • Improved employee confidence in IT systems. • Improved employee productivity.
Accounting Firm
Location: Atlanta
Established: 1998
Description:
Over 150 employees and 4 offices in the Atlanta area
13
Success Stories - SecurityVulnerability Scanning
– Problem: • Required to have periodic vulnerability scans to meet HIPAA
compliance• Client was looking for a managed solution as they did not
have internal expertise to deploy and manage an on-premise solution
• Out of compliance without this solution
– Solution: • Deployed Managed Vulnerability Scan Service
– Benefit:• Provides automated monthly vulnerability scans and reports
Healthcare Provider
Location: San Jose, CA
Established: 1989
Description:
Small provider with 2 offices and 20 employees
All Covered Security Services
Messaging Protection Email Antivirus Spam Filtering Email Continuity Email Encryption Phishing Protection
Endpoint Protection Managed Antivirus Managed Malware Protection DNS Filtering Web Content Filtering
Patching Managed Microsoft Patching
Vulnerability Management Managed Vulnerability Scan Service
All Covered will secure client environments using the following ACC services:
14
15
Additional Threats to Consider
Unfortunately, threats to your business are not only security breaches and cyber attacks; your business can also fall victim to…DATA LOSS.
16
What if You Lost Your Data?
Do you have a data backup system in place?
If your entire building burned down or all of your servers crashed, would your business be able to recover?
17
Types of Data Loss Threats
• Fires• Floods• Earthquakes• Hurricanes• Tornadoes
• Data Corruption• Hardware/System Malfunction• Software corruption• Human error• Brownouts• Theft
18
Data Loss Statistics
Every week, 140,000 hard drives crash in the United States and 31% of PC users have lost all of their files due to events beyond their control.
19
Success Stories – Data BackupDisaster Recovery
– Problem: • Fire in an adjacent building
– Solution: • All Covered Backup for Servers
– Business Continuity in the Cloud
– Benefit:• Servers damaged by water and
smoke replaced by virtual cloud servers in under 2 hours
• Access to building was lost, but full access to systems and data in the cloud was uncompromised
Location: Des Moines, Iowa
Established:1888
Description: • Community development
organization servicing central Iowa
• 21 affiliate chambers of commerce
• 5,000 business members
Community Development Company
Data Backup and Recovery Services
Managed Backup and Recovery Physical Servers Virtual Servers PCs and Laptops
Email Protection Archiving
Cloud Services Cloud Assessments Cloud Hosting
All Covered will provide protection of client data via the following ACC services:
20
21
Additional Security Measures: Cloud Services
Benefits and features:• 24x7 Availability & Reliability
• Remote access from any location
• Predictable monthly costs
• Ability to quickly scale up or down
Looking for an extra layer of security? Consider the Cloud!
All Covered Cloud Services include:
• Fully managed virtual servers located in the U.S.
• Cloud Backup and Disaster Recovery
• Cloud Hosted Exchange
• Cloud Business Continuity
Success Stories - CloudRisk Mitigation & Regulatory Compliance
22
– Problem: • Locations with aging infrastructure, intermittent Internet
and unreliable power caused major outage. All 6 branches lost access to the network and internet for several days.
– Solution: • All Covered Cloud Servers and co-location
– Benefit:• Eliminated need to purchase new servers for
secondary locations
• Reliable power to all centrally located servers while removing need to purchase backup power
• Achieved compliance conditions
Location: Troy, Michigan
Established: 1911
Description:
Community bank with 6 branches. Dedicated to meeting the financial needs of local residents and businesses.
Community Bank
23
What Are the Steps You Can Take?
• There is a saying in the medical profession, “Prevention is the Best Medicine.” The same can be said for information security.
• Businesses can overcome internal and external threats by seeking professional services from outside security experts:
A third-party security assessment gives organizations a holistic look at their technology, policies, and practices around information security.
24
All Covered Can Help
• Step 1: Plan: Build a comprehensive security plan that includes BYOD, malware and virus protection, and data security.
• Step 2: Secure: Put the right safeguards into action including - hosted AV, vulnerability management, endpoint protection, network monitoring, and patching.
• Step 3: Protect: Implement ongoing managed protection of data, PCs, and servers (both on-site and in the cloud) for quick and reliable recovery
25
Managed Vulnerability Scanning
Vulnerability Scanning Service
Scanning of all internal/external IPs Performed Monthly Obtain license assigned by All Covered Submit ACC contract for total number of IPs
to scan
Vulnerability Report Includes:
Executive summary Discovered Hosts Discovered Hosts with vulnerabilities Vulnerability details Recommended solution(s)
26
Steps You Can Take Now
Data Backup and Recovery
• Identify data that needs to be backed up• Move those files to your server• Decide on storage method:
disk vs. tape, or both• Get data offsite
Users and Networks
• Protect your data from your employees• Protect your employees from themselves• Educate employees on threats• Communicate policies and procedures• Remove password sticky notes from all monitors
27
Steps You Can Take Now
Security Management
• Centralize Management• Institute monitoring and reporting• Enforce policy across all layers• Consider Outsourcing
Data Access
• Understand where your network begins and ends• Secure the entire perimeter of your network• Define and enforce policies• Inspect and filter all traffic in and out of your network
28
Appendix
“40% of small to medium businesses who manage their own network and use the Internet for more than e-mail will have their network accessed by a hacker and more than 50% won’t even know they were attacked” (Source: Gartner Group)
“Every week, 140,000 hard drives crash in the United States and 31% of PC users have lost all of their files due to events beyond their control” (Source: Mozy Online Backup)
For more information please visit:
http://www.allcovered.com/ or http://www.allcovered.com/learning/
Social presence:
Twitter: @allcovered
Facebook: https://www.facebook.com/allcovered
LinkedIn: http://www.linkedin.com/company/all-covered
Google+: https://plus.google.com/+Allcovered-IT-service/about