10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group



Similar documents
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Jumpstarting Your Security Awareness Program

Internet threats: steps to security for your small business

Stable and Secure Network Infrastructure Benchmarks

Security Policy JUNE 1, SalesNOW. Security Policy v v

Introduction to Cyber Security / Information Security

External Supplier Control Requirements

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Client Security Risk Assessment Questionnaire

Information Security It s Everyone s Responsibility

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Security aspects of e-tailing. Chapter 7

Defending Against Data Beaches: Internal Controls for Cybersecurity

National Cyber Security Month 2015: Daily Security Awareness Tips

Projectplace: A Secure Project Collaboration Solution

The Protection Mission a constant endeavor

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

Data Access Request Service

INFORMATION SECURITY FOR YOUR AGENCY

Security Controls What Works. Southside Virginia Community College: Security Awareness

Cyber Essentials Scheme

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Small Business IT Risk Assessment

Five keys to a more secure data environment

The Education Fellowship Finance Centralisation IT Security Strategy

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Payment Card Industry Data Security Standard

HIPAA Security Education. Updated May 2016

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

NATIONAL CYBER SECURITY AWARENESS MONTH

Section 12 MUST BE COMPLETED BY: 4/22

Security Management. Keeping the IT Security Administrator Busy

Did you know your security solution can help with PCI compliance too?

How To Protect A Wireless Lan From A Rogue Access Point

ABB s approach concerning IS Security for Automation Systems

Top tips for improved network security

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Better secure IT equipment and systems

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Presented by Evan Sylvester, CISSP

How To Protect Yourself From Cyber Threats

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Cybersecurity Health Check At A Glance

Cybersecurity Best Practices

Keyfort Cloud Services (KCS)

Information Security It s Everyone s Responsibility

Seven Requirements for Successfully Implementing Information Security Policies and Standards

A Decision Maker s Guide to Securing an IT Infrastructure

How To Secure Your Store Data With Fortinet

Unified Threat Management, Managed Security, and the Cloud Services Model

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Infocomm Sec rity is incomplete without U Be aware,

Technical Testing. Network Testing DATA SHEET

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour

Best Practices For Department Server and Enterprise System Checklist

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Closing Wireless Loopholes for PCI Compliance and Security

Payment Card Industry Self-Assessment Questionnaire

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Industrial Security Solutions

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Transcription:

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl

Saalex Information Technology Overview Saalex Information Technology has been around over 12 years Service both Federal Government and Private Sector Businesses from Santa Barbara to Los Angeles IT Services and Solutions Company offering Infrastructure, Cloud Computing, Business Continuity, HIPAA/IT Security & Compliance and Managed IT Services Recently Awarded Inc. 500 Fastest Growing Co s List! Senior Technicians have a combined 30 years of experience managing infrastructure and supporting networks with up to 10 million daily users (Realtor.com)

What Can SaalexIT do for you? Services and Solutions Support IT Managed Services 24x7x365 Help Desk Cloud Hosting Services and Office 365 In the Cloud Data Backup, Disaster Recovery (Saalex Vault) FREE Cyber Security and Network Assessment Tools Security: End-to-End Security, Network Protection IT Solutions: Network Upgrades, Exchange, email Hardware, Software Procurement & Support

What s on the mind of our business customers today?

The Saalex Top 10 List for Securing your Network 1. Quarterly Security Audit 2. Wireless Networks 3. Physical Security 4. Encryption/Strong Password 5. Actively managed Antivirus and Malware 6. Next Gen Firewall Technology 7. Audit/Logging 8. Business Continuity 9. Virtualization 10. End Users

Top 10 Techniques #1 Quarterly Security Audits Quarterly Security Audit Components Vulnerability Testing: Vulnerability Analysis is the process of identifying vulnerabilities on a network; provides an overview of the flaws that exist on the system. Saalex uses Rapid Fire Penetration Testing: is an active practice wherein ethical hackers are employed to simulate an attack and test the network and systems resistance; goes on to provide an impact analysis of the flaws identifies the possible impact of the flaw on the underlying network, operating system, database etc. Social Engineering in the context of information security, is understood to mean the art of manipulating people into performing actions or divulging confidential information Kevin Mitnick Reformed computer criminal and later security consultant points out that it is much easier to trick someone into giving a password for a system than to spend the effort to crack into the system. [21] 21 Wikipedia

Top 10 Techniques #1 Quarterly Security Audit Quarterly Security Audit - Components Phishing is the act of attempting to acquire information such as usernames, passwords, credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity via electronic communications Wi-Fi Testing. We would run tools to find rogue hotspots, honeypots, poorly configured devices, and check for weak encryption. We like Wi-Fi Analyzer Industry Compliance relating to IT Security (e.g. PCI, HIPAA, SSAE 16, CARF) Check for compliance with PCI Standards, looking for security vulnerabilities such as poorly coded web applications, lack of monitoring, insecure services not removed, lack of access controls Physical Security Review - Physical Security of your IT environment like Locked Cabinets, Elevated, Limited Access for servers.

Top 10 Techniques #2 Wireless Networks Strong Encryption don t just use WEP; use WPA2 Change Passwords at regular intervals; Centrally Managed access points Guest Network rhythm of changing passwords Strong Passwords

Top 10 Techniques #3 Physical Security Physical Security: Locked Cabinet for Servers, Backups, etc. Elevated to prevent damage Limited Access can anyone get in? Controls appoint someone to monitor

Top 10 Techniques #4 Encryption and Passwords Encrypt/Strong Password Laptop Encryption Strong Passwords Multiform Authentication Mobile management OTP or Texting Services

Top 10 Techniques #5 Centrally Managed Antivirus/Antimalware Centralized managed antivirus and antimalware Update your network seamlessly Auditing, Inventory Identifying threats of infections mitigate spreading Even with this protection, malicious code can still be put on common websites, such as CNN, FOX, MSNBC, etc. exposing employees' web browsers to malicious code unknowingly

Top 10 Techniques #6 Next Gen Firewall Why are they different, what can they do better? Next Generation Firewall technologies offer integrated, highperformance protection against today's wide range of advanced threats targeting your applications, data, and users. Stop threats BEFORE they get into your environment!!! Next generation firewall technology with Application Control allows you to identify and control applications on networks and endpoints regardless of port, protocol, and IP address used. Integrated Intrusion Prevention System (IPS) offers a wide range of features that can be used to monitor and block malicious network activity.

Top 10 Techniques #6 Next Gen Firewall Next Generation Firewalls will identify the user from a list of names, IP addresses and Active Directory group memberships that it maintains locally. The connection request will be allowed only if the user belongs to one of the permitted user groups, and the assigned firewall policy will be applied to all traffic to and from that user.

Top 10 Techniques #7 Audit Logging Audit/Logging understand who had access to your machines and when to have a trail in case the worst happens... From Date: 08/01/2013 REMOTE ACCESS AUDIT LOG To Date: 08/28/2013 User Type User Name Resource Name SAAZ Agent Type Reason Session Start Time Session End Time Data Center Time User Status ITS User Robert Sebastian SAAZ Sever Agent ITS User LMI Session Request 8/28/2013 8:55:11 AM Active NOC User NOC SAAZ Sever Agent Alert ID:2013/08/28-0004437 emrans 8/28/2013 1:11:23 PM 8/28/2013 1:17:48 PM 8/28/2013 6:10:38 AM Active NOC 8/28/2013 12:03:25 User NOC SAAZ Sever Agent Alert ID:2013/08/27-0021382\tanwira 8/28/2013 7:03:43 AM 8/28/2013 7:04:50 AM AM Active ITS User Austin Pittman SAAZ Sever Agent ITS User LMI Session Request 8/27/2013 11:08:50 8/27/2013 6:08:57 PM 8/27/2013 6:40:31 PM AM Active ITS User Austin Pittman SAAZ Sever Agent ITS User LMI Session Request 8/27/2013 4:12:45 PM 8/27/2013 4:44:55 PM 8/27/2013 9:12:38 AM Active ITS User Austin Pittman SAAZ Sever Agent ITS User LMI Session Request 8/27/2013 3:52:28 PM 8/27/2013 4:00:09 PM 8/27/2013 8:52:23 AM Active NOC User NOC Alert ID:2013/08/16-0004616 sameer SAAZ Sever Agent maru AVNS 8/27/2013 4:14:49 AM 8/27/2013 4:21:46 AM 8/26/2013 9:14:40 PM Active 8/26/2013 10:58:39 ITS User Austin Pittman SAAZ Sever Agent ITS User LMI Session Request 8/26/2013 5:58:42 PM 8/26/2013 7:31:28 PM AM Active ITS User Austin Pittman SAAZ Sever Agent ITS User LMI Session Request 8/26/2013 10:21:59 8/26/2013 5:22:06 PM 8/26/2013 6:58:45 PM AM Active ITS User Austin Pittman SAAZ Sever Agent ITS User LMI Session Request 8/25/2013 10:10:09 8/26/2013 5:10:13 AM 8/26/2013 5:19:09 AM PM Active ITS User Austin Pittman SAAZ Sever Agent ITS User LMI Session Request 8/25/2013 10:09:57 8/26/2013 5:10:00 AM 8/26/2013 5:12:26 AM PM Active

Business Continuity - Confirm backups Full Data Stack Test and Verify On-site/off site DR Virtualization Top 10 Techniques #8 Business Continuity

Top 10 Techniques #9 Virtualization AKA Private Cloud Virtualization or Cloud Computing (private or public cloud) Use Case Doctor s office uses ipad to get MRI on cloud; no data resident on device Useful for - remote or seasonal employees Easy to create Virtual Desktops Quick Demo Cloud public, private, hybrid What is the cloud? It is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). What types of services? Email (gmail, Hotmail, yahoo mail), Backups (mozy, carbonite), applications (office, salesforce, facebook)

Top 10 Techniques and finally #10 Your Users! The End Users!!!! Training on best practices and relentless security consciousness Examples: Passwords (enforce) not on stickies! Unknown USB plugged into environment Think Before you Click Phishing communicate with users Physical Security Don t buy a virus Never share the same or give out passwords Don t log onto other users machines

SaalexIT Ready to leverage the Experts in IT? Contact Info: Sales Michael Flavin @ (805) 222-4977 or email: michael.flavin@saalex.com or: sales@saalex.com Or follow us on the Web and Social Media: Twitter: @SaalexIT Facebook: www.http://facebook.com/pages/saalex-information-technology LinkedIn: https://www.linkedin.com/company/saalex-it?trk=company_name Website Blog: www.saalexit.com/blogs

Cyber Security Management Structure Stan Stahl, Ph.D. President Citadel Information Group Phone: 323.428.0441 Stan@Citadel-Information.com www.citadel-information.com Copyright 2013. Citadel Information Group, Inc. All Rights Reserved.

Meeting the Cybercrime Challenge: Proactively Manage All Three Elements of Information Risk Information Security Management Copyright 2013. Citadel Information Group. All Rights Reserved. 20

Cyber Security Management Strategy Proactively manage information security just as you proactively manage finance, services, donations and other critical operational functions. 1. Implement formal risk-driven information security policies and standards 2. Identify, document and control sensitive information 3. Train and educate personnel 4. Manage IT Infrastructure from an information security point of view * * Also known to lower costs, improve user productivity and raise organizational morale Copyright 2013. Citadel Information Group. All Rights Reserved. 21

Information Security Management System ISO 27001, Annex ISO 27002 A5: Security Policy A6: Organization A7: Asset Management A8: Human Resources A9: Physical / Environmental A10: Communication & Operations Management A11: Access Control A12: Acquisition, Development & Maintenance A13: Incident Management A14: Business Continuity A15: Compliance Information Security Management System Continuous Process Improvement Engine Demonstrate Continuous Process Improvement of Organization's Ability to Secure Sensitive Information Copyright 2012. Citadel Information 9/29-30/2010 22 Group. All Rights Reserved.

Information Security Management Maturity Model Based upon Software Engineering Institute SE CMMi http://cmmiinstitute.com/. Copyright 2013. Citadel Information Group. All Rights Reserved. 23

The Final Word It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles, If you do not know your enemies but do know yourself, you will win one and lose one, If you do not know your enemies nor yourself, you will be imperiled in every single battle. Copyright 2013. Citadel Information Group. All Rights Reserved. 24