Upload
tony-degonia-lion
View
161
Download
2
Embed Size (px)
Citation preview
Welcome to the Q4 Kick-off Lunch & Learn
AboutToday, Lenovo is a
1. US$39billion personal technology company. 2. A global Fortune 500 company.3. Founded in China as Legend Holdings Co. in 19814. Changed Name to Lenovo in 1988 and acquired PC Division from IBM.5. 54,000+ employees.6. 60+ countries.7. Worlds Largest PC Maker.8. 4th Largest Smartphone Company.9. Serving customers in more than 160 countries. 10. Headquartered in Hong Kong with largest operational centers in Beijing and Morrisville, NC.
David Coady Channel Account Manager
David Coady is one of Lenovo's two Channel Account Managers here in Texas. He is in his first year with Lenovo but has been involved in technology channel sales in North Texas for the last twelve years. He is the main point of contact for Sys Logic for all Lenovo products and is supported by product specialists. He lives in Denton, TX, with his wife Julie and they are the parents of three boys.
Yoga Laptop
AMERICA'S BEST SELLING CONVERTIBLE 2-IN-1 PC Processor - 4th Generation Intel® Core™ Processors Operating System - Windows 8.1 64-bit Operating System Display - 12.5” FHD Display Rotates 360° Business Power - Tackle Business Your Way with Four Usage Modes Ultrabook - Legendary THINK Reliability & Business Features
X1 Carbon
PROFESSIONAL REDEFINED Processor - 4th Generation Intel® Core™ Processors Operating System - Windows 8.1 64-bit Operating System Display - Thin & Light Carbon with Carbon Fiber Durability Keyboard - Adaptive Keyboard That Changes with Apps Battery Charge - RapidCharge Battery - 80% Charge Within an Hour
TD/RD ServersBALANCED DESIGNOUSTANDING EFFICIENCY Processor - Intel® Xeon™ E3 Series Processors Operating System - Windows Server 2012 R2 Platform Business Power - Highly-Efficient, Dense, 1U, Rack Server Professional - Right Blend of Performance, Memory & I/O Professional - Perfect for Mainstream & Virtualized Workloads
ThinkServer SA120 Direct Attached StorageThinkServer SA120ThinkServer SA120 provides versatile, high density direct attached storage that’s ideal for small businesses, distributed enterprises or datacenters.
Tony DeGoniaDirector of Marketing
Tony is the Director of Marketing for Sys Logic Technology Services. Tony has been in the IT Industry for the last 20 years 10 of which have been in East Texas with companies he has owned and as the VP and General Manager of a major competitor before leaving in June 2013. Tony lives in Wills Point with his wonderful wife Cayse and their three children.
The Top 3 Things To Do To Secure Your Small Business Network.
Hacker News
cy-ber-at-tack [sahy-ber-uh-tak] - noun
an attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network.
Shellshock is the latest online threat sent to disrupt us. It's a loophole that affects a piece of software called Bash found mainly in Linux® or Unix® operating systems as well as the Apple®
MacOS® X. And while the Shellshock bug is more about web servers and other Internet devices,
those can now be turned against your own, more personal devices.
What is Shellshock?
Active Threats
Active Threats
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
Hackers Can Access Admin Panel of Some Netgear and
Linksys Routers
Hacker Headlines
January 2014
Home Depot Confirms Hack; Cyber Attack Could Affect
Customer Credit CardsSeptember 2014
Hacker Headlines
More retailers reportedly hit by cyber attacks – Target,
Neiman MarcusDecember 2013
Hacker Headlines
2014 Cyber Attacks
Cyber Attack Statistics
For law enforcement agencies, the IC3 serves as a conduit to receive Internet-related complaints, to conduct research related to them and to develop analytical reports for state, local, federal, tribal or international law enforcement and regulatory agencies.
FBI – IC3
In 2013, the IC3 received 262,813 consumer complaints with an adjusted dollar loss of $781,841,6111, which is a 48.8 percent increase in reported losses since 2012 ($581,441,110).
FBI – IC3
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 20130
50000
100000
150000
200000
250000
300000
350000
400000
75064
124449
207492231493
207492 206884
275284
336655
303809314246
289874
262813
Yearly Totals – Cyber Attack Complaints
262,813
119,457
$781,841,611
Total Losses - 2013
Total Number of Complaints Filed.
Number of Complaints with a Monetary Loss.
Total Monetary Value of Complaints Filed.
Someone is Messing with Texas
1. California2. Florida
3.Texas4. New York5. Pennsylvania6. New Jersey7. Illinois8. Virginia9. Ohio10. Georgia
How Many People In This Audience Feel They Take a Proactive Security Approach To Their Small Business Network Security?
Question?
Compliance
This is the scariest word in a business owners vocabulary
Compliance
3 Step Approach To Security
1.Active Security Approach2.Active Maintenance Approach3.Active Policy Approach
Active Security Approach
Active Security Approach
1. Firewall - Deploy Firewalls with MULTI-LAYERED PROTECTION on every external network (internet) connection.
Web Blocker
spamBlocker
Reputation Enabled Defense
Packet Filtering
Live Security
Intrusion Prevention
Gateway Anti-Virus
Data Loss Prevention
APT Blocker
Application Control
Active Security Approach
Active Security Approach
2. WiFi Security – WPA2 with AES Encryption. WEP IS DEAD.
Active Security Approach
3. Authentication – Auditable standards are met for all required compliances.
Active Security Approach
4. SSL - 256bit AES SSL Certificates MUST installed on all servers, firewalls, websites and applications that will gather client PI (Personal Information).
Active Security Approach
5. Licensing - All software licensing MUST active and legally acquired. A large percentage of security breaches occur through illegal or illegally licensed software. (Yes that includes Microsoft Software and Anti-Virus too).
1.888.NO.PIRACYhttps://reporting.bsa.org
Rewards Paid up to
$15,000,000
Active Security Approach
6. BC/DR – Business Continuity and Disaster Recovery. Back It Up So It Will Be There When You Need It.
Active Security Approach
1. Resilience2. Recovery3. Contingency
Active Security Approach
Firewall - Deploy Firewalls with MULTI-LAYERED
PROTECTION on every external network (internet)
connection.
WiFi Security - WPA with AES Encryption.
WEP IS DEAD.
Authentication – Auditable standards
are met for all required compliances.
SSL - 256bit AES SSL Certificates MUST installed on all servers,
firewalls, websites and applications that will gather
client PI (Personal Information).
Active Security Approach
Active Maintenance Approach
Active Maintenance Approach
1. Updates – Every device in a SMB Network requires updates and should be updated regularly through a standardized update procedure that tests the updates before deployment for both software and firmware. NO UPDATES = BAD NEWS. AUTOMATED UPDATES = CATASTROPHE.
Active Maintenance Approach
2. End-Points - (PCs, Servers, Tablets, Mobile Devices) MUST have active, updated anti-virus, anti-spyware and anti-malware software installed.
Active Maintenance Approach
3. Access and Permissions – Access and Permissions Must be Set Per Compliance Requirement and Reviewed Monthly to Ensure That Only Necessary Permissions are Granted.
4. File Sharing – Open File Sharing is Out. Securing File Sharing with Audit Trails is IN. Think BOX, OneDrive and SharePoint.
Active Maintenance Approach
Active Maintenance Approach
5. Logging and Alerts – Every Device in the Network Creates Logs and are Capable of Creating of Alerts about predefined log types.
Updates – Every device in a SMB Network requires updates and should be updated regularly through a standardized update procedure that tests the updates before deployment for both software and firmware. NO UPDATES = BAD NEWS. AUTOMATED UPDATES = CATASTROPHE.
End-Points - (PCs, Servers, Tablets, Mobile Devices) MUST have active, updated anti-virus, anti-spyware and anti-malware software installed.
Access and Permissions – Access and Permission Rules Must be Reviewed Monthly to ensure past that only necessary permissions are granted.
File Sharing – Open File Sharing is Out. Securing File Sharing with Audit Trails is IN. Think BOX, OneDrive and SharePoint.
Logging and Alerts – Every Device in the Network Creates Logs and are Capable of Creating of Alerts about predefined alert types.
Active Maintenance Approach
Active Policy Approach
Active Policy Approach
1. IT Policy is a NECESSITY.
2. Your Employees Do Not “Know What The Right Thing Is”.
Active Policy Approach
3. Do Not Write Policy That Is Unenforceable.
Active Policy Approach
4. Be Prepared to Enforce What You Write.
Active Policy Approach
5. Make Sure Your Policy Covers Your Compliance Needs.
Active Policy Approach
Active Policy ApproachIT Policy is a NECESSITY.
Your Employees Do Not “Know
What The Right Thing Is”.
Do Not Write Policy That Is
Unenforceable.
Be Prepared to Enforce What You
Write.
Make Sure Your Policy Covers Your
Compliance Needs.
Does Your Computer Company Make A Difference?
We Do.
Conclusion.
Any Questions?
www.syslogic-techsvc.com