SlideShare una empresa de Scribd logo
1 de 13
Protecting Clients’ Assets and Brand Reputation

Information Security
Workshop
Protecting Clients’ Assets and Brand Reputation

Fallacies of Information Security
•
•
•
•
•

We have anti-virus software, so we are secure
We have a firewall, we are secure
The most serious threats come from outside
Security? I backup!
It is IT Security’s problem
Protecting Clients’ Assets and Brand Reputation

IT Security Components
•
•
•
•
•
•

Users cooperation and compliance
Antivirus
Patching
Education
Intrusion Detection
Firewalls
Protecting Clients’ Assets and Brand Reputation

The Threats
•
•
•
•
•
•
•

Malware, worms, trojans, spyware
Hacking and network scanning
Not Patching
Social Engineering
Chat and IM
Weak passwords
Unawareness
Protecting Clients’ Assets and Brand Reputation

What can you do?
•
•
•
•
•
•
•

Report incidents to your security officers
Use strong passwords
Email use and security
Backup regularly
Internet security
Mobile Devices
Physical Security
Protecting Clients’ Assets and Brand Reputation

•
•
•
•
•
•
•

Use up to date antivirus software
Use your locks, both physical and software
Don’t use P2P file sharing software
Don’t reveal confidential information
Patch OS and Applications
Use firewalls
Don’t tell passwords
Protecting Clients’ Assets and Brand Reputation

•
•
•
•
•
•

Safe computing
Add-ones to internet browsers
Add-ons to email clients
Aftermarket screensavers
IMsoftware
If you have been compromised
change ALL your passwords.
Protecting Clients’ Assets and Brand Reputation

Antivirus Policy
• All networked machines must run some form
of Anti Virus
• Infected computers will be removed from the
network until cleaned
• What about at home?
Protecting Clients’ Assets and Brand Reputation

Mobile Security
•
•
•
•
•

Password protection
Encryption
Physical Security
Wireless
Remote access
Protecting Clients’ Assets and Brand Reputation

Data Security
• Data and You – Protection of sensitive data
• Identity Theft & Phishing – Don’t be a victim
• Physical Security
Protecting Clients’ Assets and Brand Reputation

Ways to protect yourself at home
•
•
•
•
•
•
•
•
•
•
•

WiFi Security
Antivirus
Backup!
Passwords
Bank & Credit Card data
Firewall
Patching
OS Patches
Instant Messaging
Email
Encryption
Problems, Questions and Solutions
Protecting Clients’ Assets and Brand Reputation

• Call the Hedgehog Security team on
– 01782 467900
Protecting Clients’ Assets and Brand Reputation

Links
• Information Security
• Penetration Testing
• Your Infosec Team

Más contenido relacionado

La actualidad más candente

Hacker
HackerHacker
Hacker
ezairy
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
Rajat Kumar
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
anandraje
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
Albrecht Jones
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 

La actualidad más candente (20)

OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Computer network
Computer networkComputer network
Computer network
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Information security
Information securityInformation security
Information security
 
Hacker
HackerHacker
Hacker
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Computer security
Computer securityComputer security
Computer security
 
PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-Computing
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification Course
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Symantec 賽門鐵克產線機台防護方案建議
Symantec 賽門鐵克產線機台防護方案建議Symantec 賽門鐵克產線機台防護方案建議
Symantec 賽門鐵克產線機台防護方案建議
 
9 - Security
9 - Security9 - Security
9 - Security
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 

Similar a Information security workshop

IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 

Similar a Information security workshop (20)

IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Information security workshop

  • 1. Protecting Clients’ Assets and Brand Reputation Information Security Workshop
  • 2. Protecting Clients’ Assets and Brand Reputation Fallacies of Information Security • • • • • We have anti-virus software, so we are secure We have a firewall, we are secure The most serious threats come from outside Security? I backup! It is IT Security’s problem
  • 3. Protecting Clients’ Assets and Brand Reputation IT Security Components • • • • • • Users cooperation and compliance Antivirus Patching Education Intrusion Detection Firewalls
  • 4. Protecting Clients’ Assets and Brand Reputation The Threats • • • • • • • Malware, worms, trojans, spyware Hacking and network scanning Not Patching Social Engineering Chat and IM Weak passwords Unawareness
  • 5. Protecting Clients’ Assets and Brand Reputation What can you do? • • • • • • • Report incidents to your security officers Use strong passwords Email use and security Backup regularly Internet security Mobile Devices Physical Security
  • 6. Protecting Clients’ Assets and Brand Reputation • • • • • • • Use up to date antivirus software Use your locks, both physical and software Don’t use P2P file sharing software Don’t reveal confidential information Patch OS and Applications Use firewalls Don’t tell passwords
  • 7. Protecting Clients’ Assets and Brand Reputation • • • • • • Safe computing Add-ones to internet browsers Add-ons to email clients Aftermarket screensavers IMsoftware If you have been compromised change ALL your passwords.
  • 8. Protecting Clients’ Assets and Brand Reputation Antivirus Policy • All networked machines must run some form of Anti Virus • Infected computers will be removed from the network until cleaned • What about at home?
  • 9. Protecting Clients’ Assets and Brand Reputation Mobile Security • • • • • Password protection Encryption Physical Security Wireless Remote access
  • 10. Protecting Clients’ Assets and Brand Reputation Data Security • Data and You – Protection of sensitive data • Identity Theft & Phishing – Don’t be a victim • Physical Security
  • 11. Protecting Clients’ Assets and Brand Reputation Ways to protect yourself at home • • • • • • • • • • • WiFi Security Antivirus Backup! Passwords Bank & Credit Card data Firewall Patching OS Patches Instant Messaging Email Encryption
  • 12. Problems, Questions and Solutions Protecting Clients’ Assets and Brand Reputation • Call the Hedgehog Security team on – 01782 467900
  • 13. Protecting Clients’ Assets and Brand Reputation Links • Information Security • Penetration Testing • Your Infosec Team