Upload
the-lorenzi-group
View
349
Download
0
Embed Size (px)
DESCRIPTION
This explains how data breaches occur, what hackers are doing to steal data, and how to protect data.
Citation preview
Data Breach:
From the Inside OutThe Lorenzi Group
Data Breaches EVERYWHERE!It seems like everyone is being hacked!
What is going on?
What do these data breaches mean to me?
Cost Effects of Data Breaches
Your Business
Loss of Trade Secrets
Public Trust Declines
Regulatory Investigations
Lawsuits
Your Customers
Loss of Privacy
ID Theft
Price of Goods Increases
Risk of Malware @ home Increases
Money allocated for business growth is instead spent cleaning up the mess!
What is REALLY Going On?
Before we get THERE, let’s look at technology today….
MOST Companies Data Security: Simplified
Internet
ISP ModemCompany Firewall
Company Router
Examples:Law Firms
Accounting FirmsCall Centers
Manufacturers Financial Advisors
Dentist OfficesRetail Stores
ETC.
NOTE: Most companies are set up like this, including YOURS… IF you’re lucky!
Company Antivirus
Who is watching
YOUR data?Get
ROAR
MOST Companies Data Security: Explained
The previous slide is the typical layout of most businesses today.
Most companies: Know to use Antivirus software. Know to have a firewall. Could spend money on IT security more
efficiently Don’t know how to properly protect Intellectual
Property Underestimate their exposure to risk
Technically “Savvy” Companies Data Security: Simplified
Internet
ISP ModemCompany Firewall
Company Router
Company IDS/IPS
Examples:Apple
MicrosoftGoogleeBay
CitiGroupNY Times Amazon
Company Antivirus
Who is watching
YOUR data?Get
ROAR
Technically “Savvy” Companies Data Security:
ExplainedThe previous slide is the layout of technically “savvy” businesses today.
Technically “Savvy” companies: Attempt to protect their ideas and work product Attempt to to control their data Aggressively use technology to protect their
business Use IDS/IPS to stop data from leaving
IDS – Intrusion Detection System IPS – Intrusion Prevention System
So, what is REALLY Going on?
Hackers are taking advantage of weakness in computer systems and
networks
With all this technology, how do
hackers get in?
How do Hackers Attack You?
They would check for a firewall. Do you even have a firewall? What’s its status? Which firewall ports are open?
They would email your employees. Can they email your employee a dangerous link? Can they email your employees a virus?
They would email your vendors. What risks do your vendors pose to your network?
What if none of these attempts worked?
More Ways to Steal Your Data…
The first set of tricks almost ALWAYS work.
1. They start to work from the INSIDE out.2. They get to know an employee.
It’s IMPORTANT to remember:3. Employees have access to your data too4. 15% of employees steal*5. Effects of Employee Theft = 7% Revenues**
* Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics ** Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics
How do we KNOW where Data Security Is Going…
Customer LawsuitsDigital Forensics
eDiscoveryEvidence Hosting & StorageRegulatory Investigations
Regulatory Fines Loss of Productivity
Loss of Competitiveness
It is TOO expensive to continue allowing data breaches to occur.
…Because the OLD way isn’t working
Where Data Security Is GOING: Simplified
Internet
ISP ModemCompany Firewall
Company Router
Company
Antivirus
Company IDS/IPS
Lorenzi ROAR
Examples:KaiserPermanent
eFidelity
LockheedMartinAssuraMed
NOTE: Examples may not be Lorenzi clients but utilize technology similar to ROAR
ROAR monitors data patterns 24x7
providing constant
feedback & insight
Security Analytics
& Intelligence
Where Data Security Is GOING: ExplainedThe previous slide is the layout of where companies need to go.
Companies will: Use existing technology to protect data
Take Additional Protections Including: Utilize Continuous Monitoring Utilize Security Analytics Reduce Bottom-line Expenses
Lorenzi ROAR Provides: Continuous Monitoring of data activity
Think: DVR’ing how data moves on your networkExample: You can replay questionable activities
Security Analytics Think: Alerting you when data does something it
hasn’t done before Examples: Forwarding an email to a private address,
FTP’ing a design, printing out financials
User Access logging for Compliance
Performance Metrics for Bottom-line management & cost savings
So, what does this mean to me?
As a Businesses Executive: Hackers are coming You won’t know where they are coming
from Protect your data (it’s easy)
As a Consumer: Hackers are watching you You NEED to encourage businesses to
protect your data Don’t click on random web-links
Wrap Up
Hackers can beat “Set it & Forget it” Technology
Companies MUST watch data movement at the DEVICE level to determine risks
Attacks are more FREQUENT from Outside In, but more SUCCESSFUL from Inside Out.
Lorenzi ROAR provides the TOOLS & INSIGHT companies NEED to protect their data.
Are YOU Ready for a FREE Trial of ROAR?
The Lorenzi Group866-632-9880 x123