or NOTwork? Turn your dealership s network into a secure, strategic asset CDK Rec mmendation Network Security Assessment



Similar documents
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

PCI Requirements Coverage Summary Table

Firewall and UTM Solutions Guide

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

The Ultimate Dealers Guide for Customer Communication to Maximize Profits

PCI Requirements Coverage Summary Table

Improving Network Uptime

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.

Stable and Secure Network Infrastructure Benchmarks

the top 5 best practices for FIELD SERVICE MOBILITY ebook

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

4 Ways an Information Security Analyst Improves Business Productivity

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Miami University. Payment Card Data Security Policy

Number: NETWORK SECURITY

Clavister InSight TM. Protecting Values

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

Security and Employee Monitoring Security and

BlackBerry Mobile Voice System

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Payment Card Industry (PCI) Data Security Standard

Beef O Brady's. Security Review. Powered by

How To Test For Security On A Network Without Being Hacked

Focus on your business, not your infrastructure. A buyer s guide to managed infrastructure services.

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

How To Protect Yourself From A Hacker Attack

10 easy steps to secure your retail network

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet

Policy for Protecting Customer Data

Why Is Compliance with PCI DSS Important?

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Information Security: A Perspective for Higher Education

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability

PCI v2.0 Compliance for Wireless LAN

Evaluating Your Network Security in. 3 Simple Steps

What Data? I m A Trucking Company!

FIRN Secure Internet Bundled Services:

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

WHITE PAPER. Preventing Wireless Data Breaches in Retail

8 Steps for Network Security Protection

Cisco Advanced Services for Network Security

Uncover security risks on your enterprise network

8 Steps For Network Security Protection

In-House Vs. Hosted Security. 10 Reasons Why Your is More Secure in a Hosted Environment

Chapter 2 Introduction

Verizon 2014 PCI Compliance Report

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Conquering PCI DSS Compliance

Cisco ASA 5500 Series Business Edition

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Cyber, Security and Privacy Questionnaire

Zone Labs Integrity Smarter Enterprise Security

Network Management In. Challenges and Opportunities for Enterprises

Cyber Security Education & Awareness. Guide for User s

Enterprise Computing Solutions

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router

Differentiating Your Healthcare Institution While Improving Profitability // White Paper

The full University IT rules page can be found at the rules here are specific to ResNet.

Data Security in the Insurance Industry: WHAT YOU NEED TO KNOW

Cyber Security Threats

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

AcroWiFi. Professional WiFi Connectivity Service. Detailed Service Catalog

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Database Security, Virtualization and Cloud Computing

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Secure Remote Control Security Features for Enterprise Remote Access and Control

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Your guests deserve the best Internet experience

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Symantec Endpoint Protection

Best Practices for PCI DSS V3.0 Network Security Compliance

FIREMON SECURITY MANAGER

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

VoIP 101: An introduction to the basics of Voice over Internet Protocol. How to guide

How To Protect Your Data From Being Hacked

Client Security Risk Assessment Questionnaire

Deploying Firewalls Throughout Your Organization

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

How To Prevent Hacker Attacks With Network Behavior Analysis

Intrusion Detection and Threat Vectors Michael Arent EDS-Global Information Security

Odessa College Use of Computer Resources Policy Policy Date: November 2010

YOUR GUIDE TO BROADBAND HIGH-SPEED INTERNET ACCESS and HOME NETWORKING

Der Weg, wie die Verantwortung getragen werden kann!

Secure networks are crucial for IT systems and their

Uninterrupted Internet:

Promoting Network Security (A Service Provider Perspective)

Let us take care of your protection so you can focus on your business.

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Best Practices For Department Server and Enterprise System Checklist

Transcription:

or NOTwork? Turn your dealership s network into a secure, strategic asset

or NOTwork? Turn your dealership s network into a strategic asset This ebook will teach you the advantages and risks associated with the backbone of your dealership your network. You will learn valuable insights on how to: Avoid network pitfalls Optimize network speed Realize how your network stacks up against industry standards Obtain Wi-Fi design, coverage and security wisdom Secure your dealership and customer data Table of Contents 3 The Router 4 Web Filtering 5 Intrusion Prevention 6 Third-party Access 7 Wireless (Wi-Fi) 8 Next Step Free 9 Trust CDK to put First Call Email Visit 888.44.634 ds.telesales@cdk.com cdkglobal.com Note: This article is for general information purposes only. Neither the author nor the publisher intends to provide any legal advice. Please contact your legal counsel if you have any legal questions or concerns.

Your dealership network generally includes your Internet, Wi-Fi, routers, switches, firewall, intrusion prevention and bandwidth. It is the backbone of your dealership. and speed matter. A slow, unsecure network can mean: Your applications and software may not function properly and speed matter 3 Your everyday reports and transactions may be paralyzing your network Your employee Internet downloads are bogging down your network 5 You need a redundant Data Center and network outage backup plan 4 Your employee productivity and your dealership as a whole will come to a crawl Is your network secure from intrusion by the outside?

The Router Your router is responsible for connecting the various parts of your network. It links your devices to the Internet and picks the best paths so everything moves as smoothly as possible. However, your router has its limitations. The link between your router and Internet speed: Routers have a finite amount of data they can process even if you upgrade your Internet connection, your current network equipment may be preventing you from taking full advantage of it A slow firewall router can limit your Internet speed To see the true speed output of your router, go to speedofme.com

Web Filtering Web filtering is a way to control which websites can be viewed from your network. It helps you restrict or allow access to sites by employees and customers. Web filtering helps to eliminate: Productivity-impacting websites, like social media and games Sites that can use up large amounts of bandwidth 3 Peer-to-peer file sharing, bit torrent, and malicious code sites, like Warez, Box, and Pirate Bay (there are legal, network performance, business security and productivity concerns with all three of these) 4 Harassment and exposure to litigation due to people viewing and sharing inappropriate materials

Intrusion Prevention Intrusion prevention assists in blocking hackers who are targeting your dealership. It helps to hamper phishing attacks and Trojan viruses before they invade your network. A data breach could put you at risk for consequences related to various regulatory requirements, including: Graham-Leach-Bliley Act (GLBA) Includes provisions to protect consumers personal financial information held by financial institutions (the FTC includes dealers who offer financing to be part of this group) 3 Payment Card Industry Data Standards (PCI DSS) If you store, transmit or process credit cards, you must comply with this standard, which includes managed intrusion prevention (see your QSA for more details)

Hostile Access When you allow third-party vendors access to your data and your network, you may be giving them more control than you think. Vendors can be doing data pulls or other bandwidth-using actions without you even knowing it. Example of a third party s actions affecting an entire dealership: At :00 p.m. every day, a dealership s entire network was slowing to a crawl The equipment appeared to be in perfect working order After further investigation, they found that a third-party vendor was doing a large data pull daily at :00 p.m When you stop using a third-party vendor, can you immediately remove the ability to access your data? Do you know who has access to your network?

Wireless (Wi-Fi) Your Wi-Fi is responsible for keeping everyone in your dealership connected to each other and your software. There are three ways to set it up: Option Set up a separate wireless infrastructure with a dedicated internet connection Option Run wireless access points on your current wired network Option 3 Set up a separate VLAN or virtual network for wireless access points on your wired network With the first two setup options, you run significant risks to the safety and efficiency of your network: Option With a separate Internet connection, you won t have the intrusion prevention or web filtering on the new network Option If you simply plug access points into your current wired network, you give everyone direct access to your network exposing your data and your customers data By choosing the third option, you can be confident that your network is secure: 3 Option By creating a virtual network (VLAN) off your wired network, you keep the speeds and access controls separate but enjoy the benefits of the web filtering and intrusion prevention

Next Step Free Depending on availability, CDK Global clients may obtain a Dashboard to assess their network security. This informative overview provides insights into: Real-time monitoring Remote access provisions (VPN) speed (both wired and wireless) Wireless coverage Wired and wireless security Real-time monitoring for breaches reliability Additionally, the Dashboard provides suggestions on how you can maximize your efforts as it relates to the areas of potential exposure. Contact ds.telesales@cdk.com to determine if you are eligible to receive a personalized network assessment. Visit cdkglobal.com/networktest to learn the security and speed of your network. 950 Hassell Rd. Hoffman Estates, IL 6069-6308 05 CDK Global, LLC / CDK Global is a trademark of CDK Global, LLC.