Network Security and the Small Business

Similar documents
OCT Training & Technology Solutions Training@qc.cuny.edu (718)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

1 Introduction. Agenda Item: Work Item:

PC Security and Maintenance

Small Business Network Security 101

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Don t Fall Victim to Cybercrime:

COSC 472 Network Security

What are Viruses, Trojans, Worms & Spyware:

Top tips for improved network security

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Common Cyber Threats. Common cyber threats include:

Countermeasures against Bots

SECURING INFORMATION SYSTEMS

1 Introduction. Agenda Item: Work Item:

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Cyber Security Awareness

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Computer Viruses: How to Avoid Infection

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Cybersecurity for the C-Level

Computer Security Maintenance Information and Self-Check Activities

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

GlobalSign Malware Monitoring

Cyber Security Awareness

Topic 1 Lesson 1: Importance of network security

Network Incident Report

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Information Security Awareness

NATIONAL CYBER SECURITY AWARENESS MONTH

October Is National Cyber Security Awareness Month!

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Spyware: Securing gateway and endpoint against data theft

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Stopping zombies, botnets and other - and web-borne threats

TIME TO LIVE ON THE NETWORK

Network Security. Demo: Web browser

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

F-Secure Anti-Virus for Mac 2015

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

BE SAFE ONLINE: Lesson Plan

Module 5: Analytical Writing

Promoting Network Security (A Service Provider Perspective)

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Corporate Account Takeover & Information Security Awareness. Customer Training

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

How to stay safe online

Managed IT Services. Eliminating technology pains in small businesses

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

2012 Endpoint Security Best Practices Survey

Norton Personal Firewall for Macintosh

STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET

Acceptable Usage Policy

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Saheel KHOYRATTY. Partner Technology Advisor

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Top Ten Cyber Threats

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

E-BUSINESS THREATS AND SOLUTIONS

Cyber Security Awareness. Internet Safety Intro.

Malware & Botnets. Botnets

Security Basics: A Whitepaper

E-Business, E-Commerce

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Introduction to Computer Security Table of Contents

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM BUSINESSES

Protecting your business from fraud

CHAPTER 10: COMPUTER SECURITY AND RISKS

Transcription:

Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises, but it is important to know that smaller enterprises are becoming easy targets for security attacks as larger companies are making more attempts to secure their networks. Today small businesses are becoming more dependent on internet and network technology for their daily business operations. As internet is becoming an indispensable tool for conducting business for smaller companies, networks of companies are becoming increasingly vulnerable to internal and external security threats such as viruses, worms etc. Networks and customer databases are critical elements for smaller companies and must be protected from these threats. A few days network downtime and lost critical customer data due to a security attack can disrupt firms productivity and can seriously damage its business credibility. Your Network is Vulnerable to Security Attacks Today internet has become an indispensable business tool for all small businesses and many of small businesses have their own networks. While internet connectivity is essential for growth of your small business but with increased use of the internet in all business activities, networks are becoming more and more vulnerable to security attacks. Most security attacks are not aimed at any specific company or network. The SANS Internet Storm Center 2 publishes data reporting average time, an unprotected computer can stay connected to internet. It reported that unprotected computer that is connected to the Internet, can become About is an IT solutions and services company that specialise in finding ways to make technology work better for your business. We work very hard to ensure that the IT systems will keep your business operating smoothly every day. infected in just 23 minutes. Many small businesses think that they are less likely targets for security attacks as compared to large enterprises, but it is important to know that smaller enterprises are becoming easy targets for security attacks as larger companies are making more attempts to secure their networks. Network Security and the Small Business 1

They have full fledged IT departments at their disposal but small businesses cannot afford permanent IT staff. According to Internet Security Alliance 1, attacks on information systems operated by small and mid-sized companies Information security threats are evolving constantly like any other technology as hackers are developing new and sophisticated methods of intrusion. The security threats mainly come from internal and external sources. are growing rapidly. One survey showed that one out of every three small businesses was affected by MyDoom virus while only one out of six large enterprises was affected by the same virus. A single and the smallest security breach can prove fatal for a small business. For example, a few days downtime and lost critical customer data due to a security attack can disrupt firms productivity and can seriously damage its business credibility. Major Security Threats to Small Business Network Information security threats are evolving constantly like any other technology as hackers are developing new and sophisticated methods of intrusion. The security threats mainly come from internal and external sources. External Security Threats These threats make a start from outside sources. The following are main external threats: Viruses & Worms: A computer virus is computer program that can replicates itself many times and it spreads from one host computer to other computers connected to it. A virus can corrupt or delete data on the computer or can even damage operating system of the computer. It can spread itself by different means i.e. through e mail attachments; instant messaging messages and through downloads from internet. A computer worm spread itself without a host program and is self sustained. Trojan Horses: A Trojan horse is a program that presents itself as a useful computer program but actually it is malicious program that causes damage to the computer and allows an unauthorized remote user to gain access to the system. Spam: The spam is unsolicited commercial email messages. Spam messages may appear in different forms like it may offer to sell something or it may be designed to take so much network bandwidth that it can cause it to slow down. Spam wastes bandwidth and time. Network Security and the Small Business 2

Phishing: It refers to spam e mail messages to steal sensitive information like account information, credit card numbers etc. A phishing e mail commonly supplies a link of websites like PayPal or ebay to click on, where it demands to re-enter credit card number, password etc. But the sites are not authentic sites although they look like so. Spyware: It is malicious, hidden program that collects and sends users personal data like internet surfing habits, online activities of user etc. to spyware creators. It can also interfere in other ways like installing additional software, changing computer settings etc. DoS (Denial of Service) Attacks: DoS attacks are assaults to overload or halt a network service such as a Web server or a file server. An intruder overloads the network by flooding it with fake requests by employees, customers etc. Server becomes so busy that it is unable to handle legitimate requests for connection by the actual employees. The aim of this attack is to make the network unavailable for normal business activities. Internal Security Threats: These threats are caused by people within the company. These may arise from human error like poor password protection, failure to update antivirus software or improper and careless file downloading by company employees or may come from a malicious insider or a disgruntled employee of company. The Economic Impact of Network Attacks on Small Business Network security breaches can have many tangible and intangible impacts on a small business. Research firm Computer Economics has reported that organizations face three types of economic impact as a result of hacks or intrusions. 1 Internet security Alliance, Common Sense Guide to Cyber Security for Small Businesses 2 Internet Storm Center, Are you being harassed or stalked online? Network Security and the Small Business 3

The immediate economic impacts include costs of repairing or replacing the damaged system, disruption of business operations and delays in transactions and cash flow. Short term economic impacts include loss of contractual relationships or existing customers due to company s inability to deliver products, negative impact on the reputation of an organization and hindrance to the development of new business. Long-term economic impacts are decline in market valuation and stock prices and reduced goodwill standing. Findings of Computer Economics has also shown that in smaller companies, major economic impact of malicious attacks is lost revenue which accounts for about 50 percent of the economic impact. The cost of cleaning, repairing and restoring computers and networks represents about 20 percent of the economic impact in smaller companies as compared to eight percent in larger companies. The loss of productivity represents about 30 percent in smaller companies and 12 percent in larger companies. ROI for Security Spending Annual ROI for security spending for small business ranged between $6,282 (for companies with 25 devices attached to computers) and $23,873 (with 100 devices attached to computers) in low intensity e-business environment and between $56,738 and $196,020 for high intensity e-business organizations. Conclusions and Recommendations As smaller firms are becoming more dependent on internet for conducting their business, they are becoming increasingly vulnerable to damaging security attacks. Whether company is vulnerable to computer viruses and worms, denial-of-service (DoS) attacks, malicious employees or human error, all these threats are large enough for a small business to devastate its credibility and customer base. So securing information systems is critical for any small business as network security breaches directly impact a company s bottom line. Network Security and the Small Business 4

Recommendations: You can take following basic steps to protect your network and critical business data: You must have antivirus software and anti spyware software installed on all of your computers. Antivirus software scans your databases and e mail messages to prevent infections of viruses. Anti spyware protects your network form malicious programs. But as new threats are constantly being developed Anti spyware protects your network form malicious programs. But as new threats are constantly being developed by hackers, so you must update your antivirus and anti spyware software regularly so that it can detect and prevent all the new threats. by hackers, so you must update your antivirus and anti spyware software regularly so that it can detect and prevent all the new threats. Set up a firewall to monitor flow of traffic and to control unwanted access to your network or computers. Protect your sensitive documents with passwords. Do not use passwords that are easy to guess. You must change passwords regularly. Use the internet safely and download programs from trusted websites only. About Building 2, 10 Duerdin Street, Clayton VIC 3168 AUSTRALIA Phone: (03) 8542 7333 Email: askme@techware.com.au Web: Network Security and the Small Business 5