Risks & Reality https://youtu.be/2sh4BIaF6gg Cyber Security Risks & Reality https://youtu.be/2sh4BIaF6gg.

Slides:



Advertisements
Similar presentations
Security Update Server Registration, Active scanning and Windows patching.
Advertisements

Security for Mobile Devices
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Payment Card Industry (PCI) Data Security Standard
Session 3 – Information Security Policies
Security Guidelines and Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Incident Response Updated 03/20/2015
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SEC835 Database and Web application security Information Security Architecture.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Dell Connected Security Solutions Simplify & unify.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security tools for records managers Frank Rankin.
Computer Security Sample security policy Dr Alexei Vernitski.
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Security fundamentals
Securing Information Systems
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Technology and Business Continuity
What they are and how to protect against them
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Administrative Practices Outcome 1
Configuring Windows Firewall with Advanced Security
Data Compromises: A Tax Practitioners “Nightmare”
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
Introduction to Networking
Year 10 ICT ECDL/ICDL IT Security.
Securing Information Systems
CYB 110 Competitive Success/snaptutorial.com
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Cybersecurity Strategy
12 STEPS TO A GDPR AWARE NETWORK
Contact Center Security Strategies
Information Security Awareness
How to Mitigate the Consequences What are the Countermeasures?
Cyber security Policy development and implementation
Implementing Client Security on Windows 2000 and Windows XP Level 150
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
IS4680 Security Auditing for Compliance
Cybersecurity Threat Assessment
Cybersecurity and Cyberhygiene
6. Application Software Security
Personal Mobile Device Acceptable Use Policy Training Slideshow
Cloud Computing for Wireless Networks
Presentation transcript:

Risks & Reality https://youtu.be/2sh4BIaF6gg Cyber Security Risks & Reality https://youtu.be/2sh4BIaF6gg

The reality out there How to crack every Windows password http://pcsupport.about.com/od/toolsofthetrade/tp/passrecovery.htm http://www.nirsoft.net/password_recovery_tools.html http://www.hiren.info/pages/bootcd ERD Commander Including browser saved passwords… What is a bios password? Which can be reset: http://www.wikihow.com/Reset-a-BIOS-Password How about my phone or tablet? Location option (enable GPS) and reset option

Types of threats What is threatened In realty… Disgruntled employees Careless or uninformed staff (loose tongues) Mobile devices (especially BYOD) Cloud apps Unpatched software/devices – or not kept up to date And… Cyber crime syndicates “Cons” & Fraud Hacktivists Intellectual property theft Malware, Trojans and botnets Website insecurities and “passbys”

Some pointers Never use Admin as a user name Never give admin rights to anyone unless they need them Use a screensaver with a password Never leave a machine unattended without being logged off Never use the remember password feature on a browser Be security minded Always assume the worst A single anti-virus programme will not catch everything NEVER open an email attachment unless you know the person sending it or have asked for it If anything doesn’t look right it isn’t Always read before clicking a button Know how to read a URL

Some videos explaining… https://www.getsafeonline.org/video/ https://www.getsafeonline.org/video/ https://youtu.be/aEmF3Iylvr4 https://youtu.be/2sh4BIaF6gg

The Cyber Essentials Scheme A Government initiative An assurance framework BiYP has Stage 1

Those essential steps - 1 Information Risk Management Regime Assess the risks to your organisation’s information assets with the same vigour as you would for legal, regulatory, financial or operational risk. To achieve this, embed an Information Risk Management Regime across your organisation, supported by the Board, senior managers and an empowered information assurance (IA) structure. Consider communicating your risk management policy across your organisation to ensure that employees, contractors and suppliers are aware of your organisation’s risk management boundaries.

Those essential steps – 2 & 3 Secure configuration Introduce corporate policies and processes to develop secure baseline builds, and manage the configuration and use of your ICT systems. Remove or disable unnecessary functionality from ICT systems, and keep them patched against known vulnerabilities. Failing to do this will expose your business to threats and vulnerabilities, and increase risk to the confidentiality, integrity and availability of systems and information. Network security Connecting to untrusted networks (such as the Internet) can expose your organisation to cyber attacks. Follow recognised network design principles when configuring perimeter and internal network segments, and ensure all network devices are configured to the secure baseline build. Filter all traffic at the network perimeter so that only traffic required to support your business is allowed, and monitor traffic for unusual or malicious incoming and outgoing activity that could indicate an attack (or attempted attack).

Those essential steps – 4 & 5 Managing user privileges All users of your ICT systems should only be provided with the user privileges that they need to do their job. Control the number of privileged accounts for roles such as system or database administrators, and ensure this type of account is not used for high risk or day-to-day user activities. Monitor user activity, particularly all access to sensitive information and privileged account actions (such as creating new user accounts, changes to user passwords and deletion of accounts and audit logs). User education and awareness Produce user security policies that describe acceptable and secure use of your organisation’s ICT systems. These should be formally acknowledged in employment terms and conditions. All users should receive regular training on the cyber risks they face as employees and individuals. Security related roles (such as system administrators, incident management team members and forensic investigators) will require specialist training.

Those essential steps – 6 & 7 Incident management Establish an incident response and disaster recovery capability that addresses the full range of incidents that can occur. All incident management plans (including disaster recovery and business continuity) should be regularly tested. Your incident response team may need specialist training across a range of technical and non-technical areas. Report online crimes to the relevant law enforcement agency to help the UK build a clear view of the national threat and deliver an appropriate response. Malware prevention Produce policies that directly address the business processes (such as email, web browsing, removable media and personally owned devices) that are vulnerable to malware. Scan for malware across your organisation and protect all host and client machines with antivirus solutions that will actively scan for malware. All information supplied to or from your organisation should be scanned for malicious content.

Those essential steps – 8 & 9 Monitoring Establish a monitoring strategy and develop supporting policies, taking into account previous security incidents and attacks, and your organisation’s incident management policies. Continuously monitor inbound and outbound network traffic to identify unusual activity or trends that could indicate attacks and the compromise of data. Monitor all ICT systems using Network and Host Intrusion Detection Systems (NIDS/HIDS) and Prevention Systems (NIPS/HIDS). Removable media controls Produce removable media policies that control the use of removable media for the import and export of information. Where the use of removable media is unavoidable, limit the types of media that can be used together with the users, systems, and types of information that can be transferred. Scan all media for malware using a standalone media scanner before any data is imported into your organisation’s system.

Those essential steps – 10 Home and mobile working Assess the risks to all types of mobile working (including remote working where the device connects to the corporate network infrastructure) and develop appropriate security policies. Train mobile users on the secure use of their mobile devices for locations they will be working from. Apply the secure baseline build to all types of mobile device used. Protect data-at-rest using encryption (if the device supports it) and protect data-in-transit using an appropriately configured Virtual Private Network (VPN).

How does BiYP fulfil these? Policies and Procedures The practical elements Everyone is responsible including the board Later…