Frontline Defense Against Hackers: Your Employees...SMB Cyber Risk by the numbers . CONFIDENTIAL |...

Preview:

Citation preview

CONFIDENTIAL | ©2017 Cooperative Systems 1

Frontline Defense Against Hackers: Your Employees

Steve Martocchio

VP of Operations

Cooperative Systems

CONFIDENTIAL | ©2017 Cooperative Systems 2

Cybersecurity: Why it matters to SMBsPt

1

Preventing Cyber AttacksPt

2Cybersecurity Webinar Series Check-Point

CONFIDENTIAL | ©2017 Cooperative Systems 3

Cybersecurity: Why it matters to SMBsPt

1

Preventing Cyber AttacksPt

2

Key Components for Strong Security PosturePt

3Cybersecurity Webinar Series Check-Point

CONFIDENTIAL | ©2017 Cooperative Systems 4

SMB Cyber Risk by the

numbers

CONFIDENTIAL | ©2017 Cooperative Systems 5

SMBs in the US breached

in the past 12 months >1/2

2016 State of SMB Cybersecurity Report (Ponemon Institute)

CONFIDENTIAL | ©2017 Cooperative Systems 6

Businesses with less than 1K employees that were attacked this year had to cease operations immediately 22%

Second Annual State of Ransomware Report (Osterman Research alongside Malwarebytes)

CONFIDENTIAL | ©2017 Cooperative Systems 7

SMBs that go out of business after falling victim to a successful cyber

attack >60%2017 SMB Insights Report(The Business Journals, a division of ACBJ)

CONFIDENTIAL | ©2017 Cooperative Systems 8

Key Components for Strong Security Posture

CONFIDENTIAL | ©2017 Cooperative Systems 9

Key Components for Strong Security Posture

Educate And Empower

Your Team

CONFIDENTIAL | ©2017 Cooperative Systems 10

CONFIDENTIAL | ©2017 Cooperative Systems 11

True Stories of Connecticut SMBs

CONFIDENTIAL | ©2017 Cooperative Systems 12

CONFIDENTIAL | ©2017 Cooperative Systems 13

CONFIDENTIAL | ©2017 Cooperative Systems 14

CONFIDENTIAL | ©2017 Cooperative Systems 15

CONFIDENTIAL | ©2017 Cooperative Systems 16

CONFIDENTIAL | ©2017 Cooperative Systems 17

Insider Threat

CONFIDENTIAL | ©2017 Cooperative Systems 18

CONFIDENTIAL | ©2017 Cooperative Systems 19

Key Components for Strong Security Posture

Make A Plan

CONFIDENTIAL | ©2017 Cooperative Systems 20

Where to start?:

Conduct a comprehensive inventory

Understand Your Cyber Policy

Know Your Vendor Contracts

WISP (Written Information Security Plan)

CONFIDENTIAL | ©2017 Cooperative Systems 21

Key Components for Strong Security Posture

Protection & Prevention

CONFIDENTIAL | ©2017 Cooperative Systems 22

Multi-Layered Security

Encryption

Patching Policies & Platforms

Mobile Device Management

DNS Filtering

Access Controls

Gateway ProtectionData Loss Prevention

Password Management

Multi-Factor Authentication

Vulnerability Testing

Security Monitoring

Penetration Testing

Anti-X Platforms

CONFIDENTIAL | ©2017 Cooperative Systems 23

Key Components for Strong Security Posture

Backup &

Business Continuity

Planning

CONFIDENTIAL | ©2017 Cooperative Systems 24

Key Components for Strong Security Posture

321

Have A Plan

Protection & Prevention

Educate And Empower Your Team

4 Backup & Disaster Recovery

CONFIDENTIAL | ©2017 Cooperative Systems 25

Steve Martocchio

VP of Operations

Cooperative Systems

smartocchio@coopsys.com

(860) 523-1000

www.noahITservices.com

Recommended