LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation...

55

Transcript of LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation...

Page 1: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify
Page 2: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

LEARNING OBJECTIVES

• Minimize litigation risk

• Discuss security best practices

• Review security tools and techniques

• Identify seven cybersecurity “must-do’s”

2016 © Azstec, LLC Slide 2

Page 3: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

PANEL

Imtiaz Munshi, CPA

(Subbing is Sajid Patel, Co-Founder Azstec)[email protected]

https://www.linkedin.com/in/imtiaz-munshi-57725a

David [email protected]

https://www.linkedin.com/in/david-griffith-9020b813

Mark [email protected]

https://www.linkedin.com/in/mgibbs

2016 © Azstec, LLC Slide 3

Page 4: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

WHY PROTECT DATA?

• Good business practice

• Defends firm’s reputation

• Risk mitigation

• Industry requirements

• Regulatory requirements

• Patriot Act exposure

• Protect intellectual property

2016 © Azstec, LLC Slide 4

Page 5: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

SMALL BUSINESS TECH

• PC-centric

• Windows and MS Office

• Email and data servers

• Networking infrastructure

• Remote access

• Public cloud

• Website and private client portal

• Data backups

2016 © Azstec, LLC Slide 5

Page 6: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

WHERE’S THE DATA?

At Rest

• Obvious: data server, backup storage, PCs

• Not so obvious: email, smartphone, cloud, printer

In Transit

• Email

• Uploads / downloads

• LAN and Wi-Fi transmission

• Online meetings

2016 © Azstec, LLC Slide 6

Page 7: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

DATA BREACHES

• Accidental: Human error

– Wrong email address

– Poor passwords

– Lost/stolen device

• Deliberate: Internal and external

– Most likely internal

– Direct external breach risk for small business lower

EXCEPT for malware.

2016 © Azstec, LLC Slide 7

Page 8: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

BREACH CONSEQUENCES

• Recovery and notification costs

• Brand damage

• Litigation

• Penalties and fines

• Theft of IP

2016 © Azstec, LLC Slide 8

Page 9: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

POLLING QUESTION #1

Which of these negative impacts of cybersecurity breaches are you most concerned about?

Litigation

Ransom demand

Loss of reputation

Loss of intellectual property

2016 © Azstec, LLC Slide 9

Page 10: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

RISK MITIGATION

• Make security “top of mind”

• Tech policies and procedures

• Physical security of data

• Software solutions

• Hardware solutions

• D.I.Y. versus IT expert

• Cyber insurance

2016 © Azstec, LLC Slide 10

Page 11: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

POLICIES AND PROCEDURES

• Minimize impact of human error

• Get organizational buy-in

• Have an appropriate security policy

• Protect against all breaches

• Bolster defense in litigation; “due care”

2016 © Azstec, LLC Slide 11

Page 12: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

SMALL BUSINESS IT

ENVIROMENT

2016 © Azstec, LLC Slide 12

Page 13: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

PHYSICAL SECURITY

• Physical premises access

• Desktops vs. other devices

• Kensington locks

• Terminate ex-employees’ access

• Visitor control

• Maintenance, security, and janitorial

• The Tao of Shredding

2016 © Azstec, LLC Slide 13

Page 14: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

NETWORK SECURITY

• Internet firewall

• Strong passwords and password managers

• Use “Pro” versions of Windows OS

• Anti-malware software

• Wi-Fi; no WPS and managed guest access

• Storage access control

• Disk and email encryption software

• Control and restrict applications

2016 © Azstec, LLC Slide 14

Page 15: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

POLLING QUESTION #2

In your opinion, which of these is the LEAST

secure?

Email

Smartphones

Laptops

Data Servers

2016 © Azstec, LLC Slide 15

Page 16: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

HARDWARE SECURITY

• Protect servers

• Secure desktops

• Encrypt all storage

• Phase out old hardware

• Infrastructure management

• Beware the IoT (e.g. Pwn Plug)

2016 © Azstec, LLC Slide 16

Page 17: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

MOBILE DEVICES

• Smartphones, tablets, laptops, USB drives

• Company owned or BYOD

• Data “at-rest” in mobile devices

• Need policies… and enforcement

• Mobile device management systems

2016 © Azstec, LLC Slide 17

Page 18: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

REMOTE ACCESS

• Office desktops

• Hosted virtual desktops

• No DIY fixes

• No Starbucks

• No home Wi-Fi

2016 © Azstec, LLC Slide 18

Page 19: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

CLOUDS

• Public, private, hybrid

• Always encrypt individual files in cloud

• Patriot Act Section 125

• Company policy

2016 © Azstec, LLC Slide 19

Page 20: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

EMAIL

• Once email leaves sender, security is uncertain

• Highly vulnerable to human error and hacking

• Study: 30% of business email need encryption

• Encrypt message body as well as attachments

• Low adoption of encryption because of complexity

• 38% who do encrypt use manual encryption

• Must not interfere with workflow

• Must maintain file format of encrypted attachments

2016 © Azstec, LLC Slide 20

Page 21: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

BOTTOM LINE

• Security is complicated

• Simple is better

• Passwords really matter

• Security through systems

• Systems need policies

• People make policies work

• The right tools matter

• Trust but verify

2016 © Azstec, LLC Slide 21

Page 22: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

POLLING QUESTION #3

How often do you email confidential data in

Excel, Word ?

Never

Sometimes

Quite Often

Very Frequently

2016 © Azstec, LLC Slide 22

Page 23: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

THE SEVEN MUST-DO’S

1. Use robust logins and passwords

2. Encrypt disk drives and folders

3. Encrypt individual files

4. Encrypt sensitive email

5. Protect against malware

6. Keep systems updated

7. Be wary of the Internet of Things (IoT)

2016 © Azstec, LLC Slide 23

Page 24: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

SCHNEIER ON SECURITY

2016 © Azstec, LLC

“Complexity is the worst enemy of security”

“Security is a process not a product”

“People often represent the weakest

link in the security chain”

Slide 24

Page 25: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

POLLING QUESTION #4

What are your biggest cybersecurity concerns?

Securing my data in the cloud

Protecting my network from hackers

Securing my email

Preventing employee mistakes from exposing confidential data

2016 © Azstec, LLC Slide 25

Page 26: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

docNCRYPT™ ENCRYPTION

• Designed for CPA/Financial environments

• Simple installation

• Integrates into MS Office

– Simple workflow for high adoption

– Easy to learn

• Retains Excel and Word formats

• Also encrypts email message body

2016 © Azstec, LLC Slide 26

Page 27: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

docNCRYPT™ ENCRYPTION

• We specialize in document encryption

– MS Outlook integration (shipping)

– Gmail integration (coming soon)

– Office applications (coming soon)

• Full bundle for complete document and

email security

2016 © Azstec, LLC Slide 27

Page 28: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 28

Page 29: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

docNCRYPT workflow

2016 © Azstec, LLC Slide 29

Page 30: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 30

Page 31: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 31

Page 32: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 32

Page 33: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 33

Page 34: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 34

Page 35: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 35

Page 36: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 36

Page 37: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 37

Page 38: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 38

Page 39: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 39

Page 40: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 40

Page 41: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 41

Page 42: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 42

Page 43: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 43

Page 44: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 44

Page 45: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 45

Page 46: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 46

Page 47: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 47

Page 48: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 48

Page 49: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 49

Page 50: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 50

Page 51: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

2016 © Azstec, LLC Slide 51

Page 52: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

POLLING QUESTION #5

What action/steps will you take as a result of this webinar?

Implement a written cybersecurity policy

Start using email encryption software

Strengthen the logins and passwords we use in my company

Consult with my IT person about my Cybersecurity setup

2016 © Azstec, LLC Slide 52

Page 53: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

FREE SOFTWARE AND

CYBERSECURITY WORKBOOK

Get your FREE 2 month license for docNCRYPT and your Cybersecurity Workbook

at:

security.azstec.com

click on

Or at checkout page use promo code: “safe60”(offer expires end of June)

2016 © Azstec, LLC Slide 53

Page 55: LEARNING OBJECTIVES Minimize litigation risk Discuss ...LEARNING OBJECTIVES •Minimize litigation risk •Discuss security best practices •Review security tools and techniques •Identify

THANK YOU!

2016 © Azstec, LLC

Visit us on the web to learn more…

azstec.com

Slide 55