Presentation is loading. Please wait.

Presentation is loading. Please wait.

10 things you can do today to reduce your security risk.

Similar presentations


Presentation on theme: "10 things you can do today to reduce your security risk."— Presentation transcript:

1 10 things you can do today to reduce your security risk.

2 2 10 things to do today 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Review security budget

3 3  Asset allocation = prioritization  Security budgets are among the first casualties in a budget crunch  The cost of prevention is much lower then the cost of remediation Review security budget

4 4 10 things to do today 1. 2. 3. 4. 5. 6. 7. 8. 9. Review human resource practices 10. Review security budget

5 5  Fact: CSI ( Computer Security Institute ) states that insiders accounted for 80% of security attacks on IT systems  Consider your hiring practices and those of your Vendors  Are your employees security aware?  When practical distribute key resources, company assets and processes to prevent “domino effect” Review human resource practices

6 6 10 things to do today 1. 2. 3. 4. 5. 6. 7. 8. Review vendors 9. Review human resource practices 10. Review security budget

7 7  Obtain a copy of your vendors security policies  Review your vendors disaster recovery plan  Develop “plan b”  Review vendors cyber liability coverage Review vendors

8 8 10 things to do today 1. 2. 3. 4. 5. 6. 7. Stay current with software updates 8. Review vendors 9. Review human resource practices 10. Review security budget

9 9  Software security is evolutionary  Create an update routine  Operating system and antivirus updates are critical  Update both servers and personal machines Stay current with software updates

10 10 10 things to do today 1. 2. 3. 4. 5. 6. Firewall and antivirus 7. Stay current with software updates 8. Review vendors 9. Review human resource practices 10. Review security budget

11 11  Your primary lines of defense  Cheap and Easy  Keep your data and your friends  Not all products are created equal Firewall and antivirus

12 12 10 things to do today 1. 2. 3. 4. 5. Wi-Fi 6. Firewall and antivirus 7. Stay current with software updates 8. Review vendors 9. Review human resource practices 10. Review security budget

13 13  Change your SSID and admin password  Wired Equivalent Privacy (WEP)  Media Access Control (MAC) filtering  Turn on Firewall  Firmware Wi-Fi

14 14 10 things to do today 1. 2. 3. 4. I T policies and procedures 5. Wi-Fi 6. Firewall and antivirus 7. Stay current with software updates 8. Review vendors 9. Review human resource practices 10. Review security budget

15 15  Set the tone from day 1  Develop an Acceptable Use Policy (AUP)  Explicitly forbid bypassing security checkpoints  Establish desktop management policies  Audit your systems and procedures periodically IT policies and procedures

16 16 10 things to do today 1. 2. 3. Be judicious with information 4. I T policies and procedures 5. Wi-Fi 6. Firewall and antivirus 7. Stay current with software updates 8. Review vendors 9. Review human resource practices 10. Review security budget

17 17  Social engineering  Unsecured lines of communication (IM)  Two-thirds of companies surveyed do not restrict critical data to confined areas on the network, and servers that contain critical information communicate directly with other systems that are accessible from the Internet. -CIO  Taking it with you Be judicious with information

18 18 10 things to do today 1. 2. Review physical security 3. Be judicious with information 4. I T policies and procedures 5. Wi-Fi 6. Firewall and antivirus 7. Stay current with software updates 8. Review vendors 9. Review human resource practices 10. Review security budget

19 19  Be meticulous and consistent  Lock every wiring closet and server cabinet  Change locks or door pass codes, and passwords to any shared accounts immediately when employees leave  Don’t give keys to vendors  Paper Shredder  Escort visitors in and out of secure areas Review physical security

20 20 10 things to do today 1. Back up and recovery 2. Review physical security 3. Be judicious with information 4. I T policies and procedures 5. Wi-Fi 6. Firewall and antivirus 7. Stay current with software updates 8. Review vendors 9. Review human resource practices 10. Review security budget

21 21  Develop a backup and recovery strategy that fits your company  The creation and maintenance of backup metadata and media management. “The five golden rules” 1. That which has not been backed up cannot be recovered. 2. That which has not been backed up off-site will not survive a fire. 3. Any backup that has not been tested with a recovery is not a backup. 4. Ignored backup systems become poorly performing backup systems. 5. Back it up or give it up. Backup and recovery


Download ppt "10 things you can do today to reduce your security risk."

Similar presentations


Ads by Google