View
1
Download
0
Category
Preview:
Citation preview
CONFIDENTIAL | ©2017 Cooperative Systems 1
Frontline Defense Against Hackers: Your Employees
Steve Martocchio
VP of Operations
Cooperative Systems
CONFIDENTIAL | ©2017 Cooperative Systems 2
Cybersecurity: Why it matters to SMBsPt
1
Preventing Cyber AttacksPt
2Cybersecurity Webinar Series Check-Point
CONFIDENTIAL | ©2017 Cooperative Systems 3
Cybersecurity: Why it matters to SMBsPt
1
Preventing Cyber AttacksPt
2
Key Components for Strong Security PosturePt
3Cybersecurity Webinar Series Check-Point
CONFIDENTIAL | ©2017 Cooperative Systems 4
SMB Cyber Risk by the
numbers
CONFIDENTIAL | ©2017 Cooperative Systems 5
SMBs in the US breached
in the past 12 months >1/2
2016 State of SMB Cybersecurity Report (Ponemon Institute)
CONFIDENTIAL | ©2017 Cooperative Systems 6
Businesses with less than 1K employees that were attacked this year had to cease operations immediately 22%
Second Annual State of Ransomware Report (Osterman Research alongside Malwarebytes)
CONFIDENTIAL | ©2017 Cooperative Systems 7
SMBs that go out of business after falling victim to a successful cyber
attack >60%2017 SMB Insights Report(The Business Journals, a division of ACBJ)
CONFIDENTIAL | ©2017 Cooperative Systems 8
Key Components for Strong Security Posture
CONFIDENTIAL | ©2017 Cooperative Systems 9
Key Components for Strong Security Posture
Educate And Empower
Your Team
CONFIDENTIAL | ©2017 Cooperative Systems 10
CONFIDENTIAL | ©2017 Cooperative Systems 11
True Stories of Connecticut SMBs
CONFIDENTIAL | ©2017 Cooperative Systems 12
CONFIDENTIAL | ©2017 Cooperative Systems 13
CONFIDENTIAL | ©2017 Cooperative Systems 14
CONFIDENTIAL | ©2017 Cooperative Systems 15
CONFIDENTIAL | ©2017 Cooperative Systems 16
CONFIDENTIAL | ©2017 Cooperative Systems 17
Insider Threat
CONFIDENTIAL | ©2017 Cooperative Systems 18
CONFIDENTIAL | ©2017 Cooperative Systems 19
Key Components for Strong Security Posture
Make A Plan
CONFIDENTIAL | ©2017 Cooperative Systems 20
Where to start?:
Conduct a comprehensive inventory
Understand Your Cyber Policy
Know Your Vendor Contracts
WISP (Written Information Security Plan)
CONFIDENTIAL | ©2017 Cooperative Systems 21
Key Components for Strong Security Posture
Protection & Prevention
CONFIDENTIAL | ©2017 Cooperative Systems 22
Multi-Layered Security
Encryption
Patching Policies & Platforms
Mobile Device Management
DNS Filtering
Access Controls
Gateway ProtectionData Loss Prevention
Password Management
Multi-Factor Authentication
Vulnerability Testing
Security Monitoring
Penetration Testing
Anti-X Platforms
CONFIDENTIAL | ©2017 Cooperative Systems 23
Key Components for Strong Security Posture
Backup &
Business Continuity
Planning
CONFIDENTIAL | ©2017 Cooperative Systems 24
Key Components for Strong Security Posture
321
Have A Plan
Protection & Prevention
Educate And Empower Your Team
4 Backup & Disaster Recovery
CONFIDENTIAL | ©2017 Cooperative Systems 25
Steve Martocchio
VP of Operations
Cooperative Systems
smartocchio@coopsys.com
(860) 523-1000
www.noahITservices.com
Recommended