19
Data Breach: From the Inside Out The Lorenzi Group

Data Breach from the Inside Out

Embed Size (px)

DESCRIPTION

This explains how data breaches occur, what hackers are doing to steal data, and how to protect data.

Citation preview

Page 1: Data Breach from the Inside Out

Data Breach:

From the Inside OutThe Lorenzi Group

Page 2: Data Breach from the Inside Out

Data Breaches EVERYWHERE!It seems like everyone is being hacked!

What is going on?

What do these data breaches mean to me?

Page 3: Data Breach from the Inside Out

Cost Effects of Data Breaches

Your Business

Loss of Trade Secrets

Public Trust Declines

Regulatory Investigations

Lawsuits

Your Customers

Loss of Privacy

ID Theft

Price of Goods Increases

Risk of Malware @ home Increases

Money allocated for business growth is instead spent cleaning up the mess!

Page 4: Data Breach from the Inside Out

What is REALLY Going On?

Before we get THERE, let’s look at technology today….

Page 5: Data Breach from the Inside Out

MOST Companies Data Security: Simplified

Internet

ISP ModemCompany Firewall

Company Router

Examples:Law Firms

Accounting FirmsCall Centers

Manufacturers Financial Advisors

Dentist OfficesRetail Stores

ETC.

NOTE: Most companies are set up like this, including YOURS… IF you’re lucky!

Company Antivirus

Who is watching

YOUR data?Get

ROAR

Page 6: Data Breach from the Inside Out

MOST Companies Data Security: Explained

The previous slide is the typical layout of most businesses today.

Most companies: Know to use Antivirus software. Know to have a firewall. Could spend money on IT security more

efficiently Don’t know how to properly protect Intellectual

Property Underestimate their exposure to risk

Page 7: Data Breach from the Inside Out

Technically “Savvy” Companies Data Security: Simplified

Internet

ISP ModemCompany Firewall

Company Router

Company IDS/IPS

Examples:Apple

MicrosoftGoogleeBay

CitiGroupNY Times Amazon

Company Antivirus

Who is watching

YOUR data?Get

ROAR

Page 8: Data Breach from the Inside Out

Technically “Savvy” Companies Data Security:

ExplainedThe previous slide is the layout of technically “savvy” businesses today.

Technically “Savvy” companies: Attempt to protect their ideas and work product Attempt to to control their data Aggressively use technology to protect their

business Use IDS/IPS to stop data from leaving

IDS – Intrusion Detection System IPS – Intrusion Prevention System

Page 9: Data Breach from the Inside Out

So, what is REALLY Going on?

Hackers are taking advantage of weakness in computer systems and

networks

Page 10: Data Breach from the Inside Out

With all this technology, how do

hackers get in?

Page 11: Data Breach from the Inside Out

How do Hackers Attack You?

They would check for a firewall. Do you even have a firewall? What’s its status? Which firewall ports are open?

They would email your employees. Can they email your employee a dangerous link? Can they email your employees a virus?

They would email your vendors. What risks do your vendors pose to your network?

What if none of these attempts worked?

Page 12: Data Breach from the Inside Out

More Ways to Steal Your Data…

The first set of tricks almost ALWAYS work.

1. They start to work from the INSIDE out.2. They get to know an employee.

It’s IMPORTANT to remember:3. Employees have access to your data too4. 15% of employees steal*5. Effects of Employee Theft = 7% Revenues**

* Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics ** Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics

Page 13: Data Breach from the Inside Out

How do we KNOW where Data Security Is Going…

Customer LawsuitsDigital Forensics

eDiscoveryEvidence Hosting & StorageRegulatory Investigations

Regulatory Fines Loss of Productivity

Loss of Competitiveness

It is TOO expensive to continue allowing data breaches to occur.

…Because the OLD way isn’t working

Page 14: Data Breach from the Inside Out

Where Data Security Is GOING: Simplified

Internet

ISP ModemCompany Firewall

Company Router

Company

Antivirus

Company IDS/IPS

Lorenzi ROAR

Examples:KaiserPermanent

eFidelity

LockheedMartinAssuraMed

NOTE: Examples may not be Lorenzi clients but utilize technology similar to ROAR

ROAR monitors data patterns 24x7

providing constant

feedback & insight

Security Analytics

& Intelligence

Page 15: Data Breach from the Inside Out

Where Data Security Is GOING: ExplainedThe previous slide is the layout of where companies need to go.

Companies will: Use existing technology to protect data

Take Additional Protections Including: Utilize Continuous Monitoring Utilize Security Analytics Reduce Bottom-line Expenses

Page 16: Data Breach from the Inside Out

Lorenzi ROAR Provides: Continuous Monitoring of data activity

Think: DVR’ing how data moves on your networkExample: You can replay questionable activities

Security Analytics Think: Alerting you when data does something it

hasn’t done before Examples: Forwarding an email to a private address,

FTP’ing a design, printing out financials

User Access logging for Compliance

Performance Metrics for Bottom-line management & cost savings

Page 17: Data Breach from the Inside Out

So, what does this mean to me?

As a Businesses Executive: Hackers are coming You won’t know where they are coming

from Protect your data (it’s easy)

As a Consumer: Hackers are watching you You NEED to encourage businesses to

protect your data Don’t click on random web-links

Page 18: Data Breach from the Inside Out

Wrap Up

Hackers can beat “Set it & Forget it” Technology

Companies MUST watch data movement at the DEVICE level to determine risks

Attacks are more FREQUENT from Outside In, but more SUCCESSFUL from Inside Out.

Lorenzi ROAR provides the TOOLS & INSIGHT companies NEED to protect their data.

Page 19: Data Breach from the Inside Out

Are YOU Ready for a FREE Trial of ROAR?

The Lorenzi Group866-632-9880 x123

[email protected]