61
Welcome to the Q4 Kick-off Lunch & Learn

Lenovo Presentation for Sys Logic Lunch and Learn

Embed Size (px)

Citation preview

Page 1: Lenovo Presentation for Sys Logic Lunch and Learn

Welcome to the Q4 Kick-off Lunch & Learn

Page 2: Lenovo Presentation for Sys Logic Lunch and Learn

AboutToday, Lenovo is a

1. US$39billion personal technology company. 2. A global Fortune 500 company.3. Founded in China as Legend Holdings Co. in 19814. Changed Name to Lenovo in 1988 and acquired PC Division from IBM.5. 54,000+ employees.6. 60+ countries.7. Worlds Largest PC Maker.8. 4th Largest Smartphone Company.9. Serving customers in more than 160 countries. 10. Headquartered in Hong Kong with largest operational centers in Beijing and Morrisville, NC.

Page 3: Lenovo Presentation for Sys Logic Lunch and Learn

David Coady Channel Account Manager

David Coady is one of Lenovo's two Channel Account Managers here in Texas. He is in his first year with Lenovo but has been involved in technology channel sales in North Texas for the last twelve years. He is the main point of contact for Sys Logic for all Lenovo products and is supported by product specialists. He lives in Denton, TX, with his wife Julie and they are the parents of three boys.

Page 4: Lenovo Presentation for Sys Logic Lunch and Learn
Page 5: Lenovo Presentation for Sys Logic Lunch and Learn

Yoga Laptop

AMERICA'S BEST SELLING CONVERTIBLE 2-IN-1 PC Processor - 4th Generation Intel® Core™ Processors Operating System - Windows 8.1 64-bit Operating System Display - 12.5” FHD Display Rotates 360° Business Power - Tackle Business Your Way with Four Usage Modes Ultrabook - Legendary THINK Reliability & Business Features

Page 6: Lenovo Presentation for Sys Logic Lunch and Learn
Page 7: Lenovo Presentation for Sys Logic Lunch and Learn

X1 Carbon

PROFESSIONAL REDEFINED Processor - 4th Generation Intel® Core™ Processors Operating System - Windows 8.1 64-bit Operating System Display - Thin & Light Carbon with Carbon Fiber Durability Keyboard - Adaptive Keyboard That Changes with Apps Battery Charge - RapidCharge Battery - 80% Charge Within an Hour

Page 8: Lenovo Presentation for Sys Logic Lunch and Learn
Page 9: Lenovo Presentation for Sys Logic Lunch and Learn

TD/RD ServersBALANCED DESIGNOUSTANDING EFFICIENCY Processor - Intel® Xeon™ E3 Series Processors Operating System - Windows Server 2012 R2 Platform Business Power - Highly-Efficient, Dense, 1U, Rack Server Professional - Right Blend of Performance, Memory & I/O Professional - Perfect for Mainstream & Virtualized Workloads

Page 10: Lenovo Presentation for Sys Logic Lunch and Learn
Page 11: Lenovo Presentation for Sys Logic Lunch and Learn

ThinkServer SA120 Direct Attached StorageThinkServer SA120ThinkServer SA120 provides versatile, high density direct attached storage that’s ideal for small businesses, distributed enterprises or datacenters.

Page 12: Lenovo Presentation for Sys Logic Lunch and Learn
Page 13: Lenovo Presentation for Sys Logic Lunch and Learn

Tony DeGoniaDirector of Marketing

Tony is the Director of Marketing for Sys Logic Technology Services. Tony has been in the IT Industry for the last 20 years 10 of which have been in East Texas with companies he has owned and as the VP and General Manager of a major competitor before leaving in June 2013. Tony lives in Wills Point with his wonderful wife Cayse and their three children.

Page 14: Lenovo Presentation for Sys Logic Lunch and Learn

The Top 3 Things To Do To Secure Your Small Business Network.

Page 15: Lenovo Presentation for Sys Logic Lunch and Learn

Hacker News

Page 16: Lenovo Presentation for Sys Logic Lunch and Learn

cy-ber-at-tack [sahy-ber-uh-tak] - noun

an attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network.

Page 17: Lenovo Presentation for Sys Logic Lunch and Learn

Shellshock is the latest online threat sent to disrupt us. It's a loophole that affects a piece of software called Bash found mainly in Linux® or Unix® operating systems as well as the Apple®

MacOS® X. And while the Shellshock bug is more about web servers and other Internet devices,

those can now be turned against your own, more personal devices.

What is Shellshock?

Active Threats

Page 18: Lenovo Presentation for Sys Logic Lunch and Learn

Active Threats

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Page 19: Lenovo Presentation for Sys Logic Lunch and Learn

Hackers Can Access Admin Panel of Some Netgear and

Linksys Routers

Hacker Headlines

January 2014

Page 20: Lenovo Presentation for Sys Logic Lunch and Learn

Home Depot Confirms Hack; Cyber Attack Could Affect

Customer Credit CardsSeptember 2014

Hacker Headlines

Page 21: Lenovo Presentation for Sys Logic Lunch and Learn

More retailers reportedly hit by cyber attacks – Target,

Neiman MarcusDecember 2013

Hacker Headlines

Page 22: Lenovo Presentation for Sys Logic Lunch and Learn

2014 Cyber Attacks

Page 23: Lenovo Presentation for Sys Logic Lunch and Learn

Cyber Attack Statistics

Page 24: Lenovo Presentation for Sys Logic Lunch and Learn

For law enforcement agencies, the IC3 serves as a conduit to receive Internet-related complaints, to conduct research related to them and to develop analytical reports for state, local, federal, tribal or international law enforcement and regulatory agencies.

FBI – IC3

Page 25: Lenovo Presentation for Sys Logic Lunch and Learn

In 2013, the IC3 received 262,813 consumer complaints with an adjusted dollar loss of $781,841,6111, which is a 48.8 percent increase in reported losses since 2012 ($581,441,110).

FBI – IC3

Page 26: Lenovo Presentation for Sys Logic Lunch and Learn

2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 20130

50000

100000

150000

200000

250000

300000

350000

400000

75064

124449

207492231493

207492 206884

275284

336655

303809314246

289874

262813

Yearly Totals – Cyber Attack Complaints

Page 27: Lenovo Presentation for Sys Logic Lunch and Learn

262,813

119,457

$781,841,611

Total Losses - 2013

Total Number of Complaints Filed.

Number of Complaints with a Monetary Loss.

Total Monetary Value of Complaints Filed.

Page 28: Lenovo Presentation for Sys Logic Lunch and Learn

Someone is Messing with Texas

1. California2. Florida

3.Texas4. New York5. Pennsylvania6. New Jersey7. Illinois8. Virginia9. Ohio10. Georgia

Page 29: Lenovo Presentation for Sys Logic Lunch and Learn

How Many People In This Audience Feel They Take a Proactive Security Approach To Their Small Business Network Security?

Question?

Page 30: Lenovo Presentation for Sys Logic Lunch and Learn

Compliance

This is the scariest word in a business owners vocabulary

Page 31: Lenovo Presentation for Sys Logic Lunch and Learn

Compliance

Page 32: Lenovo Presentation for Sys Logic Lunch and Learn

3 Step Approach To Security

1.Active Security Approach2.Active Maintenance Approach3.Active Policy Approach

Page 33: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

Page 34: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

1. Firewall - Deploy Firewalls with MULTI-LAYERED PROTECTION on every external network (internet) connection.

Web Blocker

spamBlocker

Reputation Enabled Defense

Packet Filtering

Live Security

Intrusion Prevention

Gateway Anti-Virus

Data Loss Prevention

APT Blocker

Application Control

Page 35: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

Page 36: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

2. WiFi Security – WPA2 with AES Encryption. WEP IS DEAD.

Page 37: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

3. Authentication – Auditable standards are met for all required compliances.

Page 38: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

4. SSL - 256bit AES SSL Certificates MUST installed on all servers, firewalls, websites and applications that will gather client PI (Personal Information).

Page 39: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

5. Licensing - All software licensing MUST active and legally acquired. A large percentage of security breaches occur through illegal or illegally licensed software. (Yes that includes Microsoft Software and Anti-Virus too).

1.888.NO.PIRACYhttps://reporting.bsa.org

Rewards Paid up to

$15,000,000

Page 40: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

6. BC/DR – Business Continuity and Disaster Recovery. Back It Up So It Will Be There When You Need It.

Page 41: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

1. Resilience2. Recovery3. Contingency

Page 42: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

Firewall - Deploy Firewalls with MULTI-LAYERED

PROTECTION on every external network (internet)

connection.

WiFi Security - WPA with AES Encryption.

WEP IS DEAD.

Authentication – Auditable standards

are met for all required compliances.

SSL - 256bit AES SSL Certificates MUST installed on all servers,

firewalls, websites and applications that will gather

client PI (Personal Information).

Page 43: Lenovo Presentation for Sys Logic Lunch and Learn

Active Security Approach

Page 44: Lenovo Presentation for Sys Logic Lunch and Learn

Active Maintenance Approach

Page 45: Lenovo Presentation for Sys Logic Lunch and Learn

Active Maintenance Approach

1. Updates – Every device in a SMB Network requires updates and should be updated regularly through a standardized update procedure that tests the updates before deployment for both software and firmware. NO UPDATES = BAD NEWS. AUTOMATED UPDATES = CATASTROPHE.

Page 46: Lenovo Presentation for Sys Logic Lunch and Learn

Active Maintenance Approach

2. End-Points - (PCs, Servers, Tablets, Mobile Devices) MUST have active, updated anti-virus, anti-spyware and anti-malware software installed.

Page 47: Lenovo Presentation for Sys Logic Lunch and Learn

Active Maintenance Approach

3. Access and Permissions – Access and Permissions Must be Set Per Compliance Requirement and Reviewed Monthly to Ensure That Only Necessary Permissions are Granted.

Page 48: Lenovo Presentation for Sys Logic Lunch and Learn

4. File Sharing – Open File Sharing is Out. Securing File Sharing with Audit Trails is IN. Think BOX, OneDrive and SharePoint.

Active Maintenance Approach

Page 49: Lenovo Presentation for Sys Logic Lunch and Learn

Active Maintenance Approach

5. Logging and Alerts – Every Device in the Network Creates Logs and are Capable of Creating of Alerts about predefined log types.

Page 50: Lenovo Presentation for Sys Logic Lunch and Learn
Page 51: Lenovo Presentation for Sys Logic Lunch and Learn

Updates – Every device in a SMB Network requires updates and should be updated regularly through a standardized update procedure that tests the updates before deployment for both software and firmware. NO UPDATES = BAD NEWS. AUTOMATED UPDATES = CATASTROPHE.

End-Points - (PCs, Servers, Tablets, Mobile Devices) MUST have active, updated anti-virus, anti-spyware and anti-malware software installed.

Access and Permissions – Access and Permission Rules Must be Reviewed Monthly to ensure past that only necessary permissions are granted.

File Sharing – Open File Sharing is Out. Securing File Sharing with Audit Trails is IN. Think BOX, OneDrive and SharePoint.

Logging and Alerts – Every Device in the Network Creates Logs and are Capable of Creating of Alerts about predefined alert types.

Active Maintenance Approach

Page 52: Lenovo Presentation for Sys Logic Lunch and Learn

Active Policy Approach

Page 53: Lenovo Presentation for Sys Logic Lunch and Learn

Active Policy Approach

1. IT Policy is a NECESSITY.

Page 54: Lenovo Presentation for Sys Logic Lunch and Learn

2. Your Employees Do Not “Know What The Right Thing Is”.

Active Policy Approach

Page 55: Lenovo Presentation for Sys Logic Lunch and Learn

3. Do Not Write Policy That Is Unenforceable.

Active Policy Approach

Page 56: Lenovo Presentation for Sys Logic Lunch and Learn

4. Be Prepared to Enforce What You Write.

Active Policy Approach

Page 57: Lenovo Presentation for Sys Logic Lunch and Learn

5. Make Sure Your Policy Covers Your Compliance Needs.

Active Policy Approach

Page 58: Lenovo Presentation for Sys Logic Lunch and Learn

Active Policy ApproachIT Policy is a NECESSITY.

Your Employees Do Not “Know

What The Right Thing Is”.

Do Not Write Policy That Is

Unenforceable.

Be Prepared to Enforce What You

Write.

Make Sure Your Policy Covers Your

Compliance Needs.

Page 59: Lenovo Presentation for Sys Logic Lunch and Learn

Does Your Computer Company Make A Difference?

We Do.

Page 60: Lenovo Presentation for Sys Logic Lunch and Learn
Page 61: Lenovo Presentation for Sys Logic Lunch and Learn

Conclusion.

Any Questions?

www.syslogic-techsvc.com