Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Similar documents
Cybersecurity Health Check At A Glance

Better protection for customers, and recurring revenue for you!

MONTHLY WEBSITE MAINTENANCE PACKAGES

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Client Security Risk Assessment Questionnaire

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Top tips for improved network security

GFI White Paper PCI-DSS compliance and GFI Software products

AVG AntiVirus. How does this benefit you?

Common Cyber Threats. Common cyber threats include:

Cyber Security. Securing Your Mobile and Online Banking Transactions

Section 12 MUST BE COMPLETED BY: 4/22

Networking for Caribbean Development

What Do You Mean My Cloud Data Isn t Secure?

10 Quick Tips to Mobile Security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Did you know your security solution can help with PCI compliance too?

Network Security and the Small Business

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Cyber Security: Beginners Guide to Firewalls

AVeS Cloud Security powered by SYMANTEC TM

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

THE OPEN UNIVERSITY OF TANZANIA

What you need to know to keep your computer safe on the Internet

Host/Platform Security. Module 11

74% 96 Action Items. Compliance

Cyber Essentials Scheme

On-Site Computer Solutions values these technologies as part of an overall security plan:

Presentation Objectives

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Security Management. Keeping the IT Security Administrator Busy

Auditing emerging cyber threats and IT controls

Jort Kollerie SonicWALL

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Cyber Essentials Questionnaire

ViRobot Desktop 5.5. User s Guide

Top 10 Tips to Keep Your Small Business Safe

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Are You A Sitting Duck?

Streamlining Web and Security

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines

11 NETWORK SECURITY PROJECTS. Project Understanding Key Concepts. Project Using Auditing and Event Logs. Project 11.3

Global Partner Management Notice

Network Incident Report

Reliance Bank Fraud Prevention Best Practices

How To Manage Your Information Systems At Aerosoft.Com

V1.4. Spambrella Continuity SaaS. August 2

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Reducing the Cyber Risk in 10 Critical Areas

A Decision Maker s Guide to Securing an IT Infrastructure

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Building A Secure Microsoft Exchange Continuity Appliance

Securing mobile devices in the business environment

Internet threats: steps to security for your small business

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

How to stay safe online

Connect Smart for Business SME TOOLKIT

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Software that provides secure access to technology, everywhere.

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Contents. McAfee Internet Security 3

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Introduction. PCI DSS Overview

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Data Loss Prevention in the Enterprise

Mailwall Remote Features Tour Datasheet

Trust the Innovator to Simplify Cloud Security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Cybersecurity Best Practices

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

New Systems and Services Security Guidance

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

anomaly, thus reported to our central servers.

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

Infocomm Sec rity is incomplete without U Be aware,

Workshop: Data protection in the digital office. ICO Foundation SME Workshop Technology

Critical Security Controls

Data Security. So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

How To Manage Your Computer With A Powerpoint Dpa (Powerpoint) On A Pc Or Macbook Or Macintosh (Powerstation) On Your Computer Or Ipad Or Ipa (Powerbook) On An Uniden Computer On A Network

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Security as a Service: Business Decision Factors

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Preparing Your Personal Computer to Connect to the VPN

Transcription:

Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM

Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating A Security Culture

Standards & Best Practice Backups Must be reliable check your back ups Set them up correctly are you backing up what you need to Store them off site your back up won t help if it is damaged in the same flood that damages your practice

Standards & Best Practice Patching Ensure your software and operating systems (eg., Windows) are updated regularly Patches are released to upgrade software with various features most importantly, new security features An unpatched system means you risk a higher chance of being compromised by system failures or hackers

Standards & Best Practice Privileges User accounts with administrative (or admin ) privileges allow that user to make changes over the network and on the server and download/install software, among other things Users should be set up to access only what they need to for their role. This will limit any potential security breaches.

Standards & Best Practice Passwords A complex password can mean the difference between an attacker gaining access to your network and keeping your data secure. Enforcing complex passwords from your staff will protect your staff, your business and your clients. Complex passwords should contain a variety of letters and numbers as well as a symbol. Long phrase passwords can also work very well.

Standards & Best Practice Firewalls and Remote Access Methods Firewalls let you restrict inbound and outbound access to and from your network Remote access methods can be a major security risk Only provide remote access to people/organisations who have a genuine need for it Ensure that your remote access methods a reviewed regularly to block any potential gaps

Standards & Best Practice Virus Protection If the previous standards are followed then the risk of virus infection is greatly reduced, however there is still a need for anti-virus software

Tools & Options Anti-Virus Anti-Virus software should update automatically to ensure it is set up to detect the latest viruses and threats Standalone/Free software can be cost effective, however they can be unreliable in staying up to date with definitions

Tools & Options Firewall It is imperative that you limit the connection ports to and from your network A Firewall will allow traffic flow to and from your network to be logged, with the ability to produce reports The information contained in these reports can prove fruitful in preventing attacks and compromise

Tools & Options Remote Monitoring and Management (RMM) It is critical that you work closely with your IT Service Provider to ensure you have adequate remote monitoring in place. An RMM application that sits on all servers and workstations collecting statistics, logs, and errors, and providing alerts back to your IT Service Provider on what it finds.

Tools & Options Web Filtering Blocking websites containing malware, spyware, or certain types of products is a must for preventing accidental attacks and providing access into your network. An essential feature is an integration with Google s blacklists and the ability to scan websites for embedded viruses, Trojans or malware and subsequently block them.

Tools & Options SPAM & Email Filtering SPAM continues to be received because there are people who click on the links within the emails, or follow the instructions, thus meaning that the SPAM is effective It is important to educate your staff NOT to click on links or open attachments in SPAM emails. Effective SPAM and email filtering should eliminate all types of phishing, spam and general messages that contain virus or tracking attachments

Tools & Options Remote Access Methods A recent example of remote access gone wrong occurred in a medical practice in QLD. Russian hackers were able to gain access through ports left open for RDP purposes. What followed was a business that was held to ransom when their database was encrypted and money demanded. If simple IP Blocking or closure on RDP had been in place, along with a complex password and lockout policy in place, this type of attack could have been prevented. Speak to your IT Provider about the best way to secure your Remote Access Methods

Tools & Options Backups There are various options available for backup, as a minimum you should have, daily full server image backups. In addition to your image backups you should also ensure you separately backup your business applications eg such as Best practice, Zedmed, Medical Director. All these backups should be taken offsite daily, and as Rik has mentioned, it is important these backups are tested periodically to ensure they are restorable.

Tools & Options Network Security Auditing & Scanning Scanning the network, both internal and external, with an auditing tool is an annual process where a tool is used to check potential problems and vulnerabilities Discuss this with your IT Provider to ensure that your system is as safe and secure as possible

Into The Future Passwords Protect Yourself, Your Business, Your Patients Implement a complex password regime Backups Insure your information Implement a system that works Implement it.monitor it.take it off site. You never know when you ll need it

Into The Future The Cloud Make it work for you Consider the risks and how available (and protected) your data is) Bring In The Professionals In the same way that you will refer a patient to a Specialist, it is important to refer your IT to a Specialist as well

Into The Future Security Culture Implement & Promote It An organisation with a strong security culture is critical in remaining vigilant in the ever changing world of internet security An educated staff member will not only know not to click on the link or open the attachment in an email, but will also promote these values and practices to other employees

Questions? Internet Security Protecting Your Business Thankyou