Goddard Chamber September 12th, 2019 Hosts: John Ash & Jon Grover

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Grow Your Business through Contact Centre Outsourcing Fanny Vaz Director, Personal Market Unit, CTM.
Organisational policies
24/7/365 Remote Computer Support. Program Overview.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
INDEPENDENT PROFESSIONAL RECRUITERS ORGANIZATION. RECRUITING. REDEFINED. COMBINING TECHNOLOGY WITH RECRUITING EXPERTISE.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Cctv Management Solution - CMS From – Intelitech Solutions Pvt. Limited. [ ITSPL Group ]
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
DriveSavers and the Shared Assessments Program Helping Set New Standards for the Data Recovery Industry Presented by: Lynda C. Martel, Director, Privacy.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
Santa Clara, CA (408)
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
Law Firm Data Security: What In-house Counsel Need to Know
Michael Wright • Chief Security Officer • Tech Lock
Technology and Business Continuity
The time to address enterprise mobility is now
3 Do you monitor for unauthorized intrusion activity?
ATS Service Assurance Suite presentation
Risk management.
Cloud Computing Q&A Presented by:
Breakthrough Cloud Hosting
Partner Toolbox Cloud Infrastructure & Management
The IT Budgeting Process
5 Strategies to Win Business and Stay Competitive
Customer Guide to Limited-Time Offer
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.
Cloud vs. On-premise 5 Advantages of Cloud Deployment
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Professional Services
Azure Hybrid Use Benefit Overview
Information Technology (IT) Department
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
How to prepare for the End of License of Windows Server 2012/R2
Workgroup Technology Partners
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
Outsourcing Testing - Essential Things To Look For.
CYB 110 Teaching Effectively-- snaptutorial.com
CYB 110 Education for Service-- tutorialrank.com
I have many checklists: how do I get started with cyber security?
Audit Planning Presentation - Disaster Recovery Plan
Contextual Intelligence Platform Delivers Rich, Interactive Add-Ins to Microsoft Office and Brings Users Efficiency, Quick Access to Valuable Data MICROSOFT.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
SMB practice development: Security play
Innovation driven by Intelligence
Network Security Best Practices
SMB practice development: Security play
3 BENEFITS TO CHOOSING TIME RISK VALUE
Cloud Consulting Services and Solutions
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
24/7/365 Remote Computer Support
Policies and Procedures to Protect you, your Office and your Data
3 Do you monitor for unauthorized intrusion activity?
Change. For the Better After 14 January 2020, Microsoft will no longer provide security updates or support for Windows 7. But you can keep the good times.
3 Do you monitor for unauthorized intrusion activity?
OU BATTLECARD: Oracle Utilities Learning Subscription
Presentation transcript:

Goddard Chamber September 12th, 2019 Hosts: John Ash & Jon Grover Digital Office Systems

Changing Perspective Changing from “IT” to “Technology” Security. Should I be concerned? Liability. What does this mean to me? Industry Standards. Am I getting at least standard? IT Models. Which system fits my business? Partnership. How do I stay current with a trusted partner? Next Steps……

Creating Digital Companies 2000-2010 2010-2016 2016-Forward Today Adoption eCommerce era Build up Delivery system including Social, Mobile, Cloud, Big Data/Analytics, and Managed Systems Transformation Products and services become digital as companies begin to invent their own future Reality Business are taking action as they realize, “TECHNOLOGY MATTERS”

Digital Transformation (DX) Digital transformation is about using digital technologies to improve (and connect, and often radically change) processes, enhance customer experiences, focus on the area where business and customer value meet and seeing new and better possibilities, while using different and digital-intensive ways to realize them. iScoop, Digital transformation: online guide to digital business transformation

2019 Security Concerns Computer Viruses Email Security Spyware DOS and DDOS Man-in-the Middle attacks Leaking Confidential Information

NIST (National Institute of Standards and Technology) Security Framework Identify Protection Detection Response Recover Doors Windows Alarm Dog Locks Motion Sensor Insurance Fence Doorbell Camera Police Yard Signs Neighborhood Watch Baseball Bat

Windows 7 End of Life If you continue to use Windows 7 after support has ended, your PC will still work, but it may become more vulnerable to security risks and viruses. Your PC will continue to start and run, but Microsoft will no longer provide the following support for your business. No technical support No software updates No security updates To avoid security risks and viruses, Microsoft recommends you upgrade to Windows 10. In some of the most recent businesses we have worked with there has been a range of around 33% to 67% of their current environment containing Windows 7 machines with no plan in place to upgrade.

Reduce Liabilities Access Controls Review who has control to what resources and if they need access to them Onboarding and Offboarding employees When new employees are hired they should have proper training and access to systems When employees leave your company or are terminated their access should be cut off and a proper process in place to ensure company data isn’t leaving with them. Implementing policies to protect your data Policies establish guidelines for what you can and can’t do. (BYOD, Acceptance Use Policy, etc.) Security Physical Security – limit access to rooms with important information and systems

Support Models Break/Fix Internal IT Managed Services Other Models An individual The most technical person in the office??

Don’t Get Ubered “You are either Uber, or you are being Ubered.” Technology led innovation/disruption is a factor in every industry today. Business leaders, company executives, and business owners consider the potential “Uber Effect” to be a factor in their strategic thinking. For many, disruption and innovation represent an opportunity to gain competitive advantage.

7 Program Pillars Our program provides all 7 of the Essential Technology Service Categories for delivering quality services today and are the Pillars of your Managed Services Program.

Qualified Provider Availability You don’t work 24 hours a day, but your computer does. Fast Service and Response Time Not only does your provider need to be available all the time, but they also need to respond quickly to your needs and problems. Annual IT Budget Planning A good managed services provider will sit down with you and assist in your technology planning for the future. Disaster Recovery Planning If your business is hit with a weather disaster, vandalism, or other outages, are you prepared? Third-party Vendor Partnerships An advantage of using a managed services provider is that they can handle technology vendors for you, saving you the time of tracking down multiple vendors for service and support.

Qualified Provider Local On-Site Maintenance and Support Make sure you choose a vendor that is available for onsite support. Using a local provider is a huge benefit to making sure you have the best service. Daily Backups and Cloud Services Using a managed services provider is a great way to ensure your data stays safe and secure. Security Testing and Monitoring A good managed services firm will help protect your network from cyber-criminals and hackers. Employee Support If your employees are fighting with technology, they can’t get their jobs done. Proactive Maintenance At a busy, growing company, often the temptation is to only fix technology when it is not working. A managed services partner will make sure you are pro-actively running the updates you need now to avoid problems later.

Red Flags They aren’t getting to know you and your business They don’t provide a scope of services agreement that tells you what they are providing You aren’t provided a commitment of services, so you know what is being provided for you No written contractual agreement

Next Steps Reach consensus within your office on the 7 Pillars, and what’s important…

Thank you!!