Upload
vanguard-visions
View
389
Download
0
Embed Size (px)
DESCRIPTION
You know you should be using more online business services in ‘the Cloud’ but you’re worried about being cyber-scammed? This presentation provides you with the top tips of protecting your online business operations through a few simple and effective cyber-safety steps.
Citation preview
Top tips for protecting your business online
Allison Miller, Vanguard Visions Consulting
Modbury & Salisbury
You’ll find these slides at:
slideshare.net/vanguardvisions
Session Overview
• Why protect your business online?• Why is now a good time to be doing business
online?• Top tips for protecting your business online• Online cyber-smart business assessment• What will you investigate?• Workshop evaluation
Why protect your business online?
• More business is being done in ‘the Cloud’
• Privacy obligations• Maintain reputation / trust• Protect virtual assets (data)• Multiple users of the one device
Why protect your business online?
Image: IC3 and Computer Use and Safety - http://en.wikiversity.org/wiki/IC3/Computer_Use_and_Safety
What is the “Cloud”?
Image: http://en.wikipedia.org/wiki/Cloud_computing
Cloud Computing aka “the Cloud”
Types of Cloud Services
Image: 'What Type of Cloud?: Private, Public or+Hybrid?' - http://www.flickr.com/photos/26072489@N08/5332731617
Some Examples of Public Cloud Services
Some Examples of Private Cloud Services
Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
A few ways of using the Cloud
1. Software as a Service (SAAS)– Email and Word processing– Accounting system– Human Resource/Project Management– Customer Service Management (CRM)
2. Platform as a service (PaaS) – Operating Systems – Web services– Development Platforms
3. Infrastructure as a service (IaaS)– Data storage– Processing power– Server virtualisation
Pros:• Anytime, anywhere, any device• Quickly ‘scale up’• Stronger security• External (backup) storage services• Reduced license costs• Outsource ICT services• Collaboration• Synchronisation• Greener computing
Why use the Cloud?
Image: ‘Open Sky’ by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8496879398
Why is now a good time to do business online?
Top five industries to fly in 2013-14 in Australia
Source: Ibis World (July 2013) –http://www.ibisworld.com.au/media/2013/07/10/52/
Internet is a game changer
Source: Deloitte Access Economics Pty Ltd (2013) –http://www.deloitte.com/view/en_AU/au/services/financial-advisory/deloitte-access-economics/05660fd56ab1e310VgnVCM1000003256f70aRCRD.htm
But what are some of the risks on doing more
business online?
Possible threats to your business
Tips from Queensland Government’s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud
• Hardware and software failure• Malware• Viruses• Spam, scams and phishing• Human error
General Threats
• Hackers• Fraud• Password theft• Denial of service• Security breaches• Staff dishonesty
Criminal Threats
• Fire• FloodsNatural
disasters
85% of all targeted
cyber intrusions can be prevented
Source: Strategies to Mitigate Targeted Cyber Intrusions - http://www.asd.gov.au/infosec/top35mitigationstrategies.htm
Australian Department of Defence, Intelligence and Security, Oct 2013
Top tips for protecting your business online
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tip 1:
Install and update your
security software
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Hard Disk Drive - http://en.wikipedia.org/wiki/Hard_disk_drive ; Iomega external hard disk drive - http://commons.wikimedia.org/wiki/File:Iomega_external_hard_disk_drive_%28cut%29.JPG
Tip 2:
Have a data back-up strategy
1. Assess your level of risk and identify actions to minimise
2. What data needs to be backed up and how often
3. Select an appropriate back-up device/location
4. Set reminds to do your back-ups5. Test that you can use your
backed up data6. Store backed up data away from
its original source
Develop a back-up strategy
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: The computer revolution: Databases - http://en.wikibooks.org/wiki/The_Computer_Revolution/Databases/DBMS
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Master lock with root password - http://commons.wikimedia.org/wiki/File:Master_lock_with_root_password.jpg
Tip 3:
Assign someone to be responsible for
computer security
Importance of Passwords
Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low
Password length Time taken6 2 seconds7 3 minutes8 5.5 hours9 3 weeks
10 5.4 years11 515 years12 48 millennia20 324 billion billion years
Creating strong passwords
Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low
Your password Strengthening your password
Snow-storm 5n0w-5t0rm0214-Favourite 0214-Fav0ur1te
Red-leather-yellow-leather Red-le8ther-Yellow-le8ther
Allison-Miller 8ll1son-M1ller
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: purple Slog: “Information Security Wordle” http://www.flickr.com/photos/purpleslog/2870445268/
Tip 4:
Set clear policies about
computer/ network use
1. Acceptable use2. Handling sensitive data3. Securing and handling
equipment4. Using internet safely5. Remote access6. Web browser setting
Computer/Internet Security Policy
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: The computer revolution: Databases - http://en.wikibooks.org/wiki/The_Computer_Revolution/Databases/DBMS
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Tactical Technology Collective “Title Screen” - http://www.flickr.com/photos/ttc_press/5007644722/
Tip 5:
Develop a ‘culture of security’
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Frederick Hermann - Just like the Nest with a more connected world all the devices need software updates now. Your TV, DVD player, watch, thermostat etc didn't used to ask for constant software updates .. http://www.flickr.com/photos/netzkobold/9000028511/
Tip 6:
Use and update reputable software
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: jean pierre gallot - email-spam - http://www.flickr.com/photos/jean_pierre_gallot_69009/8456188320/
Tip 7:
Use email spam filters
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Virtual Private Network - http://en.wikipedia.org/wiki/Virtual_private_network
Tip 8:
Secure your remote access
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Imagine: e-commerce - http://commons.wikimedia.org/wiki/File:E-commerce.jpg
Tip 9:
Be vigilant about selling
online
1. Secure socket layer (SSL) technology
2. Encrypted financial transaction data
3. Update to latest (tested) version4. Routine back-ups
Create a secure online presence
Tips from Queensland Government’s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud Image: The computer revolution: Databases - http://en.wikibooks.org/wiki/The_Computer_Revolution/Databases/DBMS
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tip 10:
Subscribe to cyber-security alert services
staysmartonline.gov.au/alert_service
Do the cyber-smart business assessment
staysmartonline.gov.au/business/home_based_businesses/questionnaire
1. Have good network security2. Protect your computer and
information3. Protect and use mobile devices
safely4. Transact securely online5. Back up and protect data.
Key points to remember
Tips from Queensland Government’s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud Image: The computer revolution: Databases - http://en.wikibooks.org/wiki/The_Computer_Revolution/Databases/DBMS
What will you investigate further?
Workshop evaluation
Want to know more?
More info: digitalcapability.com.auRegister for eUpdates: bit.ly/digitalcapability
Follow on: Twitter - twitter.com/digitalcapabili
Facebook - facebook.com/digitalcapabilityLinkedIn - bit.ly/DCLinkedIN
Google+ - bit.ly/DCGoogleplusPinterest - pinterest.com/vanguardvisions