SlideShare una empresa de Scribd logo
1 de 11
Information Security

The issue, why you should care and how you can help keep
your data safe.
Why is data security an important issue?
• Data breaches cost
companies millions if
not billions of dollars
each year.
• With more than 50,000
new threats emerging
each day, it can be
challenging to keep
your organization
protected.
December 3, 2013
Security by the Numbers

There were

855

data breaches
in 2011 alone

174 81%
million records were
compromised

98%
December 3, 2013
3

of these attacks
were attributed
to external
agents

of attacks involved
some sort of digital
hacking

79%

of victims
were targets of
opportunity

Source: 2012 Data Breach Investigations Report
Why are you being attacked?

Fraud

Activism

Industrial Espionage

These attacks are after
credit card numbers,
bank accounts, pass-words
… anything they can use
themselves or
sell for profit.

Activists disagree with a
particular political or social
stance you take, and want
only to create chaos and
embarrass your company
until you’ve learned your
lesson.

This is the most difficult
motive to protect yourself
against because specific
proprietary information
is targeted.

December 3, 2013

4
Top Three Security Threats
Once you’re able to identify your organization’s
potential targets, it’s important to understand
the most common types of attacks could face.

• Malware
• Internet-facing applications
• Social engineering

December 3, 2013
Social Engineering:
You Are the Weakest Link
For a company
with more than 30
employees, one expert
puts the success rate of
social engineering at
100%.

Social engineering is the art of
deceptively influencing a
person face to face, over the
phone, via email, etc., to get
the information you want.
For example:
Convincing an employee to share a company
password over the phone
Tricking someone into opening a malicious
email attachment
Sending a company “free” hardware that’s
been pre-infected
There is a bright side . . .
“Criminals are lazy and don’t want to work, so they go after the
low-hanging fruit. Companies need to think about this so their baseline
of security is above the level of low-hanging fruit.”
—Kevin Mitnick, the world’s most famous former hacker
How can you help keep
your organization safe?
• Educate and train your staff on the
dangers of social engineering.
• Perform a security audit to find and fix any
glaring vulnerabilities.
• Ask yourself (or whoever is in charge
of IT) five simple questions . . .

8

December 3, 2013 3, 2013
December

Xerox Internal Use Only

8
1
2
3
4
5

“What security controls and processes are set up in the organization
to prevent and detect security breaches?”
“Do we test our security posture on an annual basis
(called pen testing)?”
“What is the response capability if a security incident is detected?”

“Are we able to handle our security requirements in-house or do
we need to outsource them?”

“If we need to outsource it, how do we find the best provider?”

December 3, 2013

9
Follow These Everyday Rules of Thumb
1. Establish a VPN connection when using free Wi-Fi.
This keeps bad guys from eavesdropping on
your internet usage.
2. Use Google Chrome as your default browser.
This isn’t a plug for Google—Internet Explorer
is the most frequently targeted browser.
3. Make sure all of your software is up to date.
Enable automatic update settings and frequently
check for newer versions of software.
4. Be wary of peer-to-peer sharing.
Downloading certain file-sharing utilities can
open up your entire hard drive to the world.
5. Diversify your passwords.
If you’re having trouble keeping them straight,
use a free, downloadable password manager.

December 3, 2013

10
For more valuable insights,
visit GetOptimistic.com
Presented by Xerox

Más contenido relacionado

La actualidad más candente

Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
Gyan Research And Analytics
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
 

La actualidad más candente (20)

Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
The Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxThe Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFox
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
 
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...Perimeter Security: Why it's no longer enough, and where cybersecurity must a...
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk Aggregation
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 

Destacado

Native americnas
Native americnasNative americnas
Native americnas
rluppo1982
 
Africa geography
Africa geographyAfrica geography
Africa geography
rluppo1982
 
44361736 lei-11-340-lei-maria-da-penha-comentada
44361736 lei-11-340-lei-maria-da-penha-comentada44361736 lei-11-340-lei-maria-da-penha-comentada
44361736 lei-11-340-lei-maria-da-penha-comentada
Agassis Rodrigues
 
Maduración y conservación de fruver acti 2
Maduración y conservación de fruver acti 2Maduración y conservación de fruver acti 2
Maduración y conservación de fruver acti 2
10861348
 
Manual de-etiqueta sustentável-2012
Manual de-etiqueta sustentável-2012Manual de-etiqueta sustentável-2012
Manual de-etiqueta sustentável-2012
Iane Gomes
 
Diccionario
DiccionarioDiccionario
Diccionario
sandrisk
 

Destacado (20)

Change is good...when you manage it properly.
Change is good...when you manage it properly.Change is good...when you manage it properly.
Change is good...when you manage it properly.
 
Business Goes Mobile
Business Goes MobileBusiness Goes Mobile
Business Goes Mobile
 
Native americnas
Native americnasNative americnas
Native americnas
 
Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]
 
Africa geography
Africa geographyAfrica geography
Africa geography
 
Puertas logicas
Puertas logicasPuertas logicas
Puertas logicas
 
Optimism in Government Revealed
Optimism in Government RevealedOptimism in Government Revealed
Optimism in Government Revealed
 
Familias logicas
Familias logicasFamilias logicas
Familias logicas
 
26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment
 
Generating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationGenerating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher Education
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Workflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesWorkflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print Services
 
44361736 lei-11-340-lei-maria-da-penha-comentada
44361736 lei-11-340-lei-maria-da-penha-comentada44361736 lei-11-340-lei-maria-da-penha-comentada
44361736 lei-11-340-lei-maria-da-penha-comentada
 
Viaje a Liverpool
Viaje a LiverpoolViaje a Liverpool
Viaje a Liverpool
 
¿De dónde es?
¿De dónde es?¿De dónde es?
¿De dónde es?
 
Maduración y conservación de fruver acti 2
Maduración y conservación de fruver acti 2Maduración y conservación de fruver acti 2
Maduración y conservación de fruver acti 2
 
Slide tan tan tan
Slide tan tan tanSlide tan tan tan
Slide tan tan tan
 
Manual de-etiqueta sustentável-2012
Manual de-etiqueta sustentável-2012Manual de-etiqueta sustentável-2012
Manual de-etiqueta sustentável-2012
 
Diccionario
DiccionarioDiccionario
Diccionario
 
Pildoritas en ingles 3
Pildoritas en ingles 3Pildoritas en ingles 3
Pildoritas en ingles 3
 

Similar a Information Security

We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
Karina Elise
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
Angilina Jones
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 

Similar a Information Security (20)

Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdf
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Threat Intelligence by the Numbers
Threat Intelligence by the NumbersThreat Intelligence by the Numbers
Threat Intelligence by the Numbers
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 

Más de Chief Optimist

Más de Chief Optimist (12)

How Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkHow Mobility is Changing the Way We Work
How Mobility is Changing the Way We Work
 
Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]
 
Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]
 
The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...
 
Optimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedOptimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace Revealed
 
Optimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedOptimism in the Modern Workplace Revealed
Optimism in the Modern Workplace Revealed
 
Finding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicFinding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots Infographic
 
Higher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicHigher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement Infographic
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]
 
Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)
 
Work is Not a Place Anymore
Work is Not a Place AnymoreWork is Not a Place Anymore
Work is Not a Place Anymore
 
Think you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedThink you’re secure? You May Be Surprised
Think you’re secure? You May Be Surprised
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Information Security

  • 1. Information Security The issue, why you should care and how you can help keep your data safe.
  • 2. Why is data security an important issue? • Data breaches cost companies millions if not billions of dollars each year. • With more than 50,000 new threats emerging each day, it can be challenging to keep your organization protected. December 3, 2013
  • 3. Security by the Numbers There were 855 data breaches in 2011 alone 174 81% million records were compromised 98% December 3, 2013 3 of these attacks were attributed to external agents of attacks involved some sort of digital hacking 79% of victims were targets of opportunity Source: 2012 Data Breach Investigations Report
  • 4. Why are you being attacked? Fraud Activism Industrial Espionage These attacks are after credit card numbers, bank accounts, pass-words … anything they can use themselves or sell for profit. Activists disagree with a particular political or social stance you take, and want only to create chaos and embarrass your company until you’ve learned your lesson. This is the most difficult motive to protect yourself against because specific proprietary information is targeted. December 3, 2013 4
  • 5. Top Three Security Threats Once you’re able to identify your organization’s potential targets, it’s important to understand the most common types of attacks could face. • Malware • Internet-facing applications • Social engineering December 3, 2013
  • 6. Social Engineering: You Are the Weakest Link For a company with more than 30 employees, one expert puts the success rate of social engineering at 100%. Social engineering is the art of deceptively influencing a person face to face, over the phone, via email, etc., to get the information you want. For example: Convincing an employee to share a company password over the phone Tricking someone into opening a malicious email attachment Sending a company “free” hardware that’s been pre-infected
  • 7. There is a bright side . . . “Criminals are lazy and don’t want to work, so they go after the low-hanging fruit. Companies need to think about this so their baseline of security is above the level of low-hanging fruit.” —Kevin Mitnick, the world’s most famous former hacker
  • 8. How can you help keep your organization safe? • Educate and train your staff on the dangers of social engineering. • Perform a security audit to find and fix any glaring vulnerabilities. • Ask yourself (or whoever is in charge of IT) five simple questions . . . 8 December 3, 2013 3, 2013 December Xerox Internal Use Only 8
  • 9. 1 2 3 4 5 “What security controls and processes are set up in the organization to prevent and detect security breaches?” “Do we test our security posture on an annual basis (called pen testing)?” “What is the response capability if a security incident is detected?” “Are we able to handle our security requirements in-house or do we need to outsource them?” “If we need to outsource it, how do we find the best provider?” December 3, 2013 9
  • 10. Follow These Everyday Rules of Thumb 1. Establish a VPN connection when using free Wi-Fi. This keeps bad guys from eavesdropping on your internet usage. 2. Use Google Chrome as your default browser. This isn’t a plug for Google—Internet Explorer is the most frequently targeted browser. 3. Make sure all of your software is up to date. Enable automatic update settings and frequently check for newer versions of software. 4. Be wary of peer-to-peer sharing. Downloading certain file-sharing utilities can open up your entire hard drive to the world. 5. Diversify your passwords. If you’re having trouble keeping them straight, use a free, downloadable password manager. December 3, 2013 10
  • 11. For more valuable insights, visit GetOptimistic.com Presented by Xerox