Cyber Security: Why your business needs protection & prevention measures
Transcript of Cyber Security: Why your business needs protection & prevention measures
![Page 1: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/1.jpg)
Why your business needs prevention & protection measures.
![Page 2: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/2.jpg)
[in-fer-mey-shuh n si-kyoo r-i-tee], noun
1. the safeguarding of your organization’s information and information systems
from unauthorized access.
![Page 3: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/3.jpg)
Loss of confidential information and data
breach liability are
HUGE RISKS for businesses.
![Page 4: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/4.jpg)
When cyber security is not part of your business process, it leaves a company vulnerable to a range of security issues.
![Page 5: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/5.jpg)
When cyber security is not part of your business process, it leaves a company vulnerable to a range of security issues.
The average cost of data breaches reached over
$3.5 MILLION in 2014!
![Page 6: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/6.jpg)
Why is it vital in 2015?
![Page 7: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/7.jpg)
![Page 8: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/8.jpg)
In 2013:
![Page 9: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/9.jpg)
In 2013:
61% of all targeted attacks were against small and medium sized businesses.
![Page 10: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/10.jpg)
In 2013:
61% of all targeted attacks were against small and medium sized businesses.
There was a 91% increase in attacks against businesses.
![Page 11: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/11.jpg)
In 2013:
61% of all targeted attacks were against small and medium sized businesses.
There was a 91% increase in attacks against businesses.
There was a 62% increase in the number of breaches.
![Page 12: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/12.jpg)
In 2013:
61% of all targeted attacks were against small and medium sized businesses.
There was a 91% increase in attacks against businesses.
There was a 62% increase in the number of breaches.
More than 552 million identities were exposed via breaches.
![Page 13: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/13.jpg)
![Page 14: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/14.jpg)
Small business cyber attacks have nearly doubled since 2011!
![Page 15: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/15.jpg)
![Page 16: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/16.jpg)
Cyber breaches can extend beyond a company’s firewalls. When this happens, contractors are also
included within the realm of risk.
![Page 17: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/17.jpg)
![Page 18: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/18.jpg)
![Page 19: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/19.jpg)
What assets are most valuable to the business?
![Page 20: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/20.jpg)
What assets are most valuable to the business?
Where are these assets supposed to reside and where do they actually reside?
![Page 21: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/21.jpg)
Who has access to them and how are they managed?
What assets are most valuable to the business?
Where are these assets supposed to reside and where do they actually reside?
![Page 22: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/22.jpg)
![Page 23: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/23.jpg)
Conduct a cyber vulnerability or penetration test at least once per year.
![Page 24: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/24.jpg)
Conduct a cyber vulnerability or penetration test at least once per year.
Can any unintended parties access critical assets?
![Page 25: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/25.jpg)
![Page 26: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/26.jpg)
Up to 30% of data breaches are due to the operation of a negligent employee or contractor.
![Page 27: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/27.jpg)
![Page 28: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/28.jpg)
Accept that security will be compromised.
![Page 29: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/29.jpg)
Accept that security will be compromised.
Consider “cyber” in all activities.
![Page 30: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/30.jpg)
Accept that security will be compromised.
Consider “cyber” in all activities.
Focus on critical information assets.
![Page 31: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/31.jpg)
Accept that security will be compromised.
Consider “cyber” in all activities.
Focus on critical information assets.
Be prepared to respond.
![Page 32: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/32.jpg)
Get the basics right.
Accept that security will be compromised.
Consider “cyber” in all activities.
Focus on critical information assets.
Be prepared to respond.
![Page 33: Cyber Security: Why your business needs protection & prevention measures](https://reader034.fdocuments.net/reader034/viewer/2022042716/55ccf211bb61eb6a758b481a/html5/thumbnails/33.jpg)
Chris Roach is Managing Director at CBIZ Risk & Advisory Services. If you have questions about cyber security and what it means to your business, Chris can be reached at [email protected].
For more information, visit www.cbiz.com/cybersecurity