Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd

Slides:



Advertisements
Similar presentations
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Information Security Information Technology and Computing Services Information Technology and Computing Services
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cyber Security & Fraud – The impact on small businesses.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Small Business Security Keith Slagle April 24, 2007.
What is Spam? d min.
Policies and Security for Internet Access
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Computer Security Sample security policy Dr Alexei Vernitski.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Important Information Provided by Information Technology Center
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Chapter 40 Internet Security.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
3 Do you monitor for unauthorized intrusion activity?
Security and Compliance with Security Standards/ Boss's Day
Unit 4 IT Security.
Lesson 3 Safe Computing.
National Cyber Security Month
I S P S loss Prevention.
Data Compromises: A Tax Practitioners “Nightmare”
That could never happen to me! Think again.
Phishing, what you should know
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
Joe, Larry, Josh, Susan, Mary, & Ken
Phishing is a form of social engineering that attempts to steal sensitive information.
Social Media Cybersafety.
Protect Your Computer Against Harmful Attacks!
Jon Peppler, Menlo Security Channels
Presented by: Brendan Walsh Manager, Security and Access Management
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
4 ways to stay safe online 1. Avoid viruses and phishing scams
Protecting Personal Information Guidance for Business.
Information Security It Is Your Business
Information Security and Travel-related Security
Network Security Best Practices
Protecting Your Information Assets
12 STEPS TO A GDPR AWARE NETWORK
Information Security Awareness
Top Ten Cyber Security Hygiene Tips
Chapter 3: Protecting Your Data and Privacy
Security Hardening through Awareness August 2018
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
What is Phishing? Pronounced “Fishing”
Cybersecurity and Cyberhygiene
3 Do you monitor for unauthorized intrusion activity?
Security in mobile technologies
Cloud and Database Security
Microsoft Data Insights Summit
Phishing 101.
Internet Safety and You
Cybersecurity Simplified: Phishing
3 Do you monitor for unauthorized intrusion activity?
Cybersecurity Simplified: Ransomware
Information Security in Your Office
Presentation transcript:

Why Cyber Security is important to SME? Win-Pro Consultancy Pte Ltd Ronald Soh Useful Tips on how you protect and secure your business

What is Cyber Security? The process of protecting information by preventing, detecting, and responding to attacks. ~ NIST The preservation of confidentiality, integrity and availability of information in the Cyberspace. ~ ISO27032

Cyber Security Key Strategy Prevention Detection Respond to Recover Review

A social engineering technique used to fraudulently obtain personal sensitive data like user credentials, credit card information Asking you to a)Open an attachment b)Click on a link and redirecting you to malicious website c)Click on a link and requesting you to enter personal information Case Study#1 – Phishing

Is a malicious software using social engineering to lock access to a computer system or encrypt data until a sum of money is paid. Case Study#2 – Ransomware

1 2 3

1

14 Ways to Protect Your Company 1.Use Strong Password. Never share your passwords with others. Change password regularly. Use 2FA if possible. Enable login timeout after x number of unsuccessful attempts 2.Restrict strangers inside your office 3.Destroy all confidential paper with shredder. 4.Dispose IT equipment carefully. 5.Wipe data securely before disposal 6.Use Good Endpoint Security. Always check that your antivirus is running with the latest signatures 7.Perform Backup Regularly. Practice (3 backup copies on 2 different backup media with at least 1 copy in the cloud)

14 Ways to Protect Your Company 8.Treat with caution. Do not open attachments or click suspicious links 9.If noticed abnormal PC behavior, then investigate further 10.Use RDP over 2FA SSL VPN 11.Update Software and Firmware regularly 12.Have a proper Firewall to secure your network against external threats 13.Perform IT Security Audit Regularly 14.Always lock your workstation when you step away Windows Key + L lock your computer

Case Study#3 – Weak Wordpress Website

Weak Login Credentials Outdated Wordpress/Plugins/Themes Lack of HTTP over SSL (https) Lack of Regular Backup Lack of Security Hardening Policies

How to Check Wordpress Security? Case Study#3 – Weak Wordpress Website

How to Check Wordpress Security? Case Study#3 – Weak Wordpress Website

Alerts and Advisories Cyber Security Agency of Singapore National Cybersecurity and Communications Integration Center Microsoft: Security Focus: