SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Page 1 © 2018 InterWorks
Caston Thomas, cthomas@iworkstech.com
Would You Rather Wait for Your
Bank Account to be Emptied
- or -
Spend $29 on Anti-Malware?
Page 2 © 2018 InterWorks
If It’s Such a Big Problem!?!
Why aren’t businesses
doing more about
cyber security?
Page 3 © 2018 InterWorks
It’s a Big Problem
Why aren’t we doing more
about cybersecurity?
Page 4 © 2018 InterWorks
The Reason We Aren’t Doing More
by Options…
by Complexity…
by Uncertainty…
by “Where Do I Even Start?”
Page 7 © 2018 InterWorks
If Only…
it could be…
…simple
…easy
…understandable
Page 9 © 2018 InterWorks
Everyone Needs… (NO Exceptions!!!)
Commitment @ the Top!
Inventory
User Awareness
Malware/Ransomware
Passwords & MFA
Email & Web Protection
Public Website Protection
Firewall
Reputation Protection
Cyber Insurance?
Page 10 © 2018 InterWorks
What if passwords walk out the door with an ex-employee,
or if criminals get access?
How long would it take to change all our passwords?
(Do we even know what they all are?)
What would it cost us if a hacker brought us down
for hours/days/permanently?
How much sensitive information do we have?
What are the consequences if it is made public?
Would it affect our credibility with customers?
How would it affect our ability to gain new customers in the aftermath?
How fast can we restore our systems to working condition? How much data would we
lose?
Have we violated regulations or made ourselves legally liable by not having
better control over passwords?
Do I Need Good “Pass-wording”?
Page 11 © 2018 InterWorks
Protecting the CRM
Choose a trusted CRM provider
Use passwords effectively
Educate employees
Secure the data
Create written policies
Audit activity regularly
Plan ahead for recovery
Page 12 © 2018 InterWorks
 LONG passwords (12-15+ characters)
 Avoid only words or phrases
 Use Symbols & Numbers
 Should be different than username
 No kids, parents, pets, sports teams, city name, etc.
 Change every 3-6 months
 Email is frequently used as user name for logins
 Use multi-factor authentication for important data
 If you write it down, secure it & use hints only YOU know
 Unique password for each important site (never use twice!) e-commerce, bank
 Never use email nor financial passwords on other sites
 Passwords stored in browsers are visible (Chrome/IE/Brave/Firefox/mobile devices)
 DON’T SHARE PASSWORDS!
Password Policy Tips (Best Practices)
Page 13 © 2018 InterWorks
10/27/2016
Use a Password Manager
“So Many Options”…
Page 15 © 2018 InterWorks
 Deploy reputable anti-Malware
 Keep it up to date
 Keep offline backups
 Keep all other software up to date
 Teach employees to recognize social
engineering
Preventing Malware
Page 16 © 2018 InterWorks
Why I REALLY Need a VPN
When you use public Wi-Fi, mobile & other networks, it can…
• Learn your habits… learn about you, your browsing habits,
and even your personal preferences
• Gather info to sell to third parties
• use it to influence what you read, hear & watch
(or that of your employees or customers)
VPNs
• provide private, encrypted connection
• hide your business’s “digital fingerprint”
• protect you (and your employees) away from the office
• safeguard your reputation
• help you avoid “evil twins”
Page 17 © 2018 InterWorks
Prices start at only $99
Page 18 © 2018 InterWorks
Remote Access & Sync to CRM & Security
Page 20 © 2018 InterWorks
Zero Trust Networking
Page 23 © 2018 InterWorks
What Do I Need?
Third party optimized to support
very small enterprise
Added Technologies & Begin w/
Assessment
InterWorks Assessment & Match
Technologies
Match Technology &
Processes to Assessment
Basics & VPN CIS 20 CIS 20/NIST NIST
Inventory
User Awareness (Basic)
Email & Web Security
Endpoint Security
Firewall
Website Security
Reputation Protection
Cyber Insurance
Inventory
User Awareness
Email & Web Security
Endpoint Security
Firewall
Website Security
Reputation Protection
Cyber Insurance
Map Required Technologies
to the Controls that are
Needed
Match Requirements to
Gaps
Page 24 © 2018 InterWorks
What Does a Technical Assessment Look Like?
encrypting sensitive business information?
maintaining & monitoring logs?
planning for disasters & cyber security incidents?
patching operating systems & applications?
continually improving processes & technology?
installing & actively managing firewalls?
Are You …
Page 25 © 2018 InterWorks
To get:
• Cybersecurity Self-Assessment Library
• Copy of this slide deck
• Answers about how we might work together
Contact: Caston Thomas cthomas@iworkstech.com
Thanks!
Page 26 © 2018 InterWorks
CYBER TIPS FOR BUSINESS
• Assess risk & identify weaknesses – If your sensitive information is linked to the
Internet, then make sure you understand how it’s being protected.
• Create a contingency plan – Establish security practices & policies to protect your
organization’s sensitive information & its employees, patrons, & stakeholders.
• Educate employees – Make sure that employees are routinely educated about new &
emerging cyber threats & how to protect your organization’s data. Hold them accountable
to the Internet security policies & procedures, & require that they use strong passwords &
regularly change them.
• Back up critical information – Establish a schedule to perform critical data backups to
ensure that critical data is not lost in the event of a cyber attack or natural disaster. Store
all backups in remote locations away from the office, & encrypt sensitive data about the
organization & its customers. Invest in data loss protection software & use two-factor
authentication where possible.
• Secure your Internet connection – Use & regularly update antivirus software &
antispyware on all computers. Automate patch deployments across your organization, use
a firewall, encrypt data in transit, & hide your Wi-Fi network. Protect all pages on your
public-facing websites.
• Create a continuity plan – A continuity plan ensures that of nature, accidents, &
technological or attack-related emergencies. Business functions can continue to be
performed during a wide range of emergencies, including localized acts templates for this
type of plan at http://www.fema.gov/planning-templates.
Page 27 © 2018 InterWorks
Cybersecurity Awareness 10 Tips
• Protect against viruses, spyware, & other malicious code
• Secure your networks Safeguard internet by using a firewall & encrypting
information
• Establish security practices & policies to protect sensitive information
• Educate employees about cyber-threats & hold them accountable
• Require employees to use strong passwords & to change them often
• Employ best practices on payment cards
• Make backup copies of important business data & information
• Control physical access to computers & network components
• Create a mobile device action plan
• Protect all pages on your public-facing websites, not just the checkout &
sign-up pages
Page 28 © 2018 InterWorks
CYBER TIPS FOR PERSONAL USE
Personal devices
(computers, laptops, tablets,
mobile phones)
•Enable automatic updates
•Enable your firewall
•Update your anti-virus/anti-
malware software
•Perform a manual backup
or enable automatic backups
if available
•Require a password/PIN to
unlock your screen
•Uninstall unused software
•Clear browser history and
saved data
Home network
•Update administrative password for router,
wireless access points, and/or Internet of Things
(IoT) devices
•Select a strong passphrase (create a sentence that
is at least 12 characters long)
•Check that the firmware is up-to-date
•Change default network name or SSID (don't use
personal information)
•Create two separate Wi-Fi networks - home and
guest
•Guest Wi-Fi is to allow visitors to access the
Internet only and not your home network
•Ensure strong wireless encryption such as WPA2
•Consider segmenting IoT devices from the rest of
the home network or connect them to the
separated guest Wi-Fi

Más contenido relacionado

La actualidad más candente

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information securitySsendiSamuel
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman Security
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsHuntsman Security
 
Information Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and ConsumersInformation Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and Consumersvictoriamac2009
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnDefending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnJohn Moran
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work placeBryley Systems Inc.
 

La actualidad más candente (20)

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Information security
Information securityInformation security
Information security
 
Information security
Information securityInformation security
Information security
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
Information Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and ConsumersInformation Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and Consumers
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Information security
Information securityInformation security
Information security
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnDefending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
 

Similar a Cybersecurity for CRM v0219-3

6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallSplunk
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
What a locked down law firm looks like updated
What a locked down law firm looks like updatedWhat a locked down law firm looks like updated
What a locked down law firm looks like updatedDenim Group
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Agedlblumen
 

Similar a Cybersecurity for CRM v0219-3 (20)

6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Train Employees to Avoid Cybercrime
Train Employees to Avoid CybercrimeTrain Employees to Avoid Cybercrime
Train Employees to Avoid Cybercrime
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
What a locked down law firm looks like updated
What a locked down law firm looks like updatedWhat a locked down law firm looks like updated
What a locked down law firm looks like updated
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 

Más de Caston Thomas

Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"Caston Thomas
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
How to adapt to the IoT
How to adapt to the IoTHow to adapt to the IoT
How to adapt to the IoTCaston Thomas
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
How to adapt to the IOT
How to adapt to the IOTHow to adapt to the IOT
How to adapt to the IOTCaston Thomas
 
The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3Caston Thomas
 
Inter works golden circles for healthcare it
Inter works golden circles for healthcare itInter works golden circles for healthcare it
Inter works golden circles for healthcare itCaston Thomas
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 

Más de Caston Thomas (9)

Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
How to adapt to the IoT
How to adapt to the IoTHow to adapt to the IoT
How to adapt to the IoT
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
How to adapt to the IOT
How to adapt to the IOTHow to adapt to the IOT
How to adapt to the IOT
 
The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3
 
Inter works golden circles for healthcare it
Inter works golden circles for healthcare itInter works golden circles for healthcare it
Inter works golden circles for healthcare it
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 

Último

Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsailfergusonamani
 
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893Health
 
Dive into Angel Investing s 2024 0502.pptx
Dive into Angel Investing s 2024 0502.pptxDive into Angel Investing s 2024 0502.pptx
Dive into Angel Investing s 2024 0502.pptxElaine Werffeli
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkavikas rana
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
How Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxHow Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxDiversity In Toys
 
NEON LIGHT CITY pitch deck for the new PC game
NEON LIGHT CITY pitch deck for the new PC gameNEON LIGHT CITY pitch deck for the new PC game
NEON LIGHT CITY pitch deck for the new PC gametess51
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfSmartinfologiks
 
How to structure your pitch - B4i template
How to structure your pitch - B4i templateHow to structure your pitch - B4i template
How to structure your pitch - B4i templateFerruccio Martinelli
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inStartupSprouts.in
 
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...Escorts service
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...ZurliaSoop
 
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...StartupSprouts.in
 
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceSohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 

Último (20)

Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsail
 
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
 
Dive into Angel Investing s 2024 0502.pptx
Dive into Angel Investing s 2024 0502.pptxDive into Angel Investing s 2024 0502.pptx
Dive into Angel Investing s 2024 0502.pptx
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
How Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxHow Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptx
 
NEON LIGHT CITY pitch deck for the new PC game
NEON LIGHT CITY pitch deck for the new PC gameNEON LIGHT CITY pitch deck for the new PC game
NEON LIGHT CITY pitch deck for the new PC game
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
 
How to structure your pitch - B4i template
How to structure your pitch - B4i templateHow to structure your pitch - B4i template
How to structure your pitch - B4i template
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
 
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
JAIPUR CALL GIRLS SERVICE REAL HOT SEXY 👯 CALL GIRLS IN JAIPUR BOOK YOUR DREA...
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
 
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
 
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceSohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 

Cybersecurity for CRM v0219-3

  • 1. Page 1 © 2018 InterWorks Caston Thomas, cthomas@iworkstech.com Would You Rather Wait for Your Bank Account to be Emptied - or - Spend $29 on Anti-Malware?
  • 2. Page 2 © 2018 InterWorks If It’s Such a Big Problem!?! Why aren’t businesses doing more about cyber security?
  • 3. Page 3 © 2018 InterWorks It’s a Big Problem Why aren’t we doing more about cybersecurity?
  • 4. Page 4 © 2018 InterWorks The Reason We Aren’t Doing More by Options… by Complexity… by Uncertainty… by “Where Do I Even Start?”
  • 5. Page 7 © 2018 InterWorks If Only… it could be… …simple …easy …understandable
  • 6. Page 9 © 2018 InterWorks Everyone Needs… (NO Exceptions!!!) Commitment @ the Top! Inventory User Awareness Malware/Ransomware Passwords & MFA Email & Web Protection Public Website Protection Firewall Reputation Protection Cyber Insurance?
  • 7. Page 10 © 2018 InterWorks What if passwords walk out the door with an ex-employee, or if criminals get access? How long would it take to change all our passwords? (Do we even know what they all are?) What would it cost us if a hacker brought us down for hours/days/permanently? How much sensitive information do we have? What are the consequences if it is made public? Would it affect our credibility with customers? How would it affect our ability to gain new customers in the aftermath? How fast can we restore our systems to working condition? How much data would we lose? Have we violated regulations or made ourselves legally liable by not having better control over passwords? Do I Need Good “Pass-wording”?
  • 8. Page 11 © 2018 InterWorks Protecting the CRM Choose a trusted CRM provider Use passwords effectively Educate employees Secure the data Create written policies Audit activity regularly Plan ahead for recovery
  • 9. Page 12 © 2018 InterWorks  LONG passwords (12-15+ characters)  Avoid only words or phrases  Use Symbols & Numbers  Should be different than username  No kids, parents, pets, sports teams, city name, etc.  Change every 3-6 months  Email is frequently used as user name for logins  Use multi-factor authentication for important data  If you write it down, secure it & use hints only YOU know  Unique password for each important site (never use twice!) e-commerce, bank  Never use email nor financial passwords on other sites  Passwords stored in browsers are visible (Chrome/IE/Brave/Firefox/mobile devices)  DON’T SHARE PASSWORDS! Password Policy Tips (Best Practices)
  • 10. Page 13 © 2018 InterWorks 10/27/2016 Use a Password Manager “So Many Options”…
  • 11. Page 15 © 2018 InterWorks  Deploy reputable anti-Malware  Keep it up to date  Keep offline backups  Keep all other software up to date  Teach employees to recognize social engineering Preventing Malware
  • 12. Page 16 © 2018 InterWorks Why I REALLY Need a VPN When you use public Wi-Fi, mobile & other networks, it can… • Learn your habits… learn about you, your browsing habits, and even your personal preferences • Gather info to sell to third parties • use it to influence what you read, hear & watch (or that of your employees or customers) VPNs • provide private, encrypted connection • hide your business’s “digital fingerprint” • protect you (and your employees) away from the office • safeguard your reputation • help you avoid “evil twins”
  • 13. Page 17 © 2018 InterWorks Prices start at only $99
  • 14. Page 18 © 2018 InterWorks Remote Access & Sync to CRM & Security
  • 15. Page 20 © 2018 InterWorks Zero Trust Networking
  • 16. Page 23 © 2018 InterWorks What Do I Need? Third party optimized to support very small enterprise Added Technologies & Begin w/ Assessment InterWorks Assessment & Match Technologies Match Technology & Processes to Assessment Basics & VPN CIS 20 CIS 20/NIST NIST Inventory User Awareness (Basic) Email & Web Security Endpoint Security Firewall Website Security Reputation Protection Cyber Insurance Inventory User Awareness Email & Web Security Endpoint Security Firewall Website Security Reputation Protection Cyber Insurance Map Required Technologies to the Controls that are Needed Match Requirements to Gaps
  • 17. Page 24 © 2018 InterWorks What Does a Technical Assessment Look Like? encrypting sensitive business information? maintaining & monitoring logs? planning for disasters & cyber security incidents? patching operating systems & applications? continually improving processes & technology? installing & actively managing firewalls? Are You …
  • 18. Page 25 © 2018 InterWorks To get: • Cybersecurity Self-Assessment Library • Copy of this slide deck • Answers about how we might work together Contact: Caston Thomas cthomas@iworkstech.com Thanks!
  • 19. Page 26 © 2018 InterWorks CYBER TIPS FOR BUSINESS • Assess risk & identify weaknesses – If your sensitive information is linked to the Internet, then make sure you understand how it’s being protected. • Create a contingency plan – Establish security practices & policies to protect your organization’s sensitive information & its employees, patrons, & stakeholders. • Educate employees – Make sure that employees are routinely educated about new & emerging cyber threats & how to protect your organization’s data. Hold them accountable to the Internet security policies & procedures, & require that they use strong passwords & regularly change them. • Back up critical information – Establish a schedule to perform critical data backups to ensure that critical data is not lost in the event of a cyber attack or natural disaster. Store all backups in remote locations away from the office, & encrypt sensitive data about the organization & its customers. Invest in data loss protection software & use two-factor authentication where possible. • Secure your Internet connection – Use & regularly update antivirus software & antispyware on all computers. Automate patch deployments across your organization, use a firewall, encrypt data in transit, & hide your Wi-Fi network. Protect all pages on your public-facing websites. • Create a continuity plan – A continuity plan ensures that of nature, accidents, & technological or attack-related emergencies. Business functions can continue to be performed during a wide range of emergencies, including localized acts templates for this type of plan at http://www.fema.gov/planning-templates.
  • 20. Page 27 © 2018 InterWorks Cybersecurity Awareness 10 Tips • Protect against viruses, spyware, & other malicious code • Secure your networks Safeguard internet by using a firewall & encrypting information • Establish security practices & policies to protect sensitive information • Educate employees about cyber-threats & hold them accountable • Require employees to use strong passwords & to change them often • Employ best practices on payment cards • Make backup copies of important business data & information • Control physical access to computers & network components • Create a mobile device action plan • Protect all pages on your public-facing websites, not just the checkout & sign-up pages
  • 21. Page 28 © 2018 InterWorks CYBER TIPS FOR PERSONAL USE Personal devices (computers, laptops, tablets, mobile phones) •Enable automatic updates •Enable your firewall •Update your anti-virus/anti- malware software •Perform a manual backup or enable automatic backups if available •Require a password/PIN to unlock your screen •Uninstall unused software •Clear browser history and saved data Home network •Update administrative password for router, wireless access points, and/or Internet of Things (IoT) devices •Select a strong passphrase (create a sentence that is at least 12 characters long) •Check that the firmware is up-to-date •Change default network name or SSID (don't use personal information) •Create two separate Wi-Fi networks - home and guest •Guest Wi-Fi is to allow visitors to access the Internet only and not your home network •Ensure strong wireless encryption such as WPA2 •Consider segmenting IoT devices from the rest of the home network or connect them to the separated guest Wi-Fi