SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Protecting Clients’ Assets and Brand Reputation

Information Security
Workshop
Protecting Clients’ Assets and Brand Reputation

Fallacies of Information Security
•
•
•
•
•

We have anti-virus software, so we are secure
We have a firewall, we are secure
The most serious threats come from outside
Security? I backup!
It is IT Security’s problem
Protecting Clients’ Assets and Brand Reputation

IT Security Components
•
•
•
•
•
•

Users cooperation and compliance
Antivirus
Patching
Education
Intrusion Detection
Firewalls
Protecting Clients’ Assets and Brand Reputation

The Threats
•
•
•
•
•
•
•

Malware, worms, trojans, spyware
Hacking and network scanning
Not Patching
Social Engineering
Chat and IM
Weak passwords
Unawareness
Protecting Clients’ Assets and Brand Reputation

What can you do?
•
•
•
•
•
•
•

Report incidents to your security officers
Use strong passwords
Email use and security
Backup regularly
Internet security
Mobile Devices
Physical Security
Protecting Clients’ Assets and Brand Reputation

•
•
•
•
•
•
•

Use up to date antivirus software
Use your locks, both physical and software
Don’t use P2P file sharing software
Don’t reveal confidential information
Patch OS and Applications
Use firewalls
Don’t tell passwords
Protecting Clients’ Assets and Brand Reputation

•
•
•
•
•
•

Safe computing
Add-ones to internet browsers
Add-ons to email clients
Aftermarket screensavers
IMsoftware
If you have been compromised
change ALL your passwords.
Protecting Clients’ Assets and Brand Reputation

Antivirus Policy
• All networked machines must run some form
of Anti Virus
• Infected computers will be removed from the
network until cleaned
• What about at home?
Protecting Clients’ Assets and Brand Reputation

Mobile Security
•
•
•
•
•

Password protection
Encryption
Physical Security
Wireless
Remote access
Protecting Clients’ Assets and Brand Reputation

Data Security
• Data and You – Protection of sensitive data
• Identity Theft & Phishing – Don’t be a victim
• Physical Security
Protecting Clients’ Assets and Brand Reputation

Ways to protect yourself at home
•
•
•
•
•
•
•
•
•
•
•

WiFi Security
Antivirus
Backup!
Passwords
Bank & Credit Card data
Firewall
Patching
OS Patches
Instant Messaging
Email
Encryption
Problems, Questions and Solutions
Protecting Clients’ Assets and Brand Reputation

• Call the Hedgehog Security team on
– 01782 467900
Protecting Clients’ Assets and Brand Reputation

Links
• Information Security
• Penetration Testing
• Your Infosec Team

Weitere ähnliche Inhalte

Was ist angesagt?

Hacker
HackerHacker
Hacker
ezairy
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
Rajat Kumar
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
anandraje
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
Albrecht Jones
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 

Was ist angesagt? (20)

OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Computer network
Computer networkComputer network
Computer network
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Information security
Information securityInformation security
Information security
 
Hacker
HackerHacker
Hacker
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Computer security
Computer securityComputer security
Computer security
 
PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-Computing
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification Course
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Symantec 賽門鐵克產線機台防護方案建議
Symantec 賽門鐵克產線機台防護方案建議Symantec 賽門鐵克產線機台防護方案建議
Symantec 賽門鐵克產線機台防護方案建議
 
9 - Security
9 - Security9 - Security
9 - Security
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 

Ähnlich wie Information security workshop

IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 

Ähnlich wie Information security workshop (20)

IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Information security workshop

  • 1. Protecting Clients’ Assets and Brand Reputation Information Security Workshop
  • 2. Protecting Clients’ Assets and Brand Reputation Fallacies of Information Security • • • • • We have anti-virus software, so we are secure We have a firewall, we are secure The most serious threats come from outside Security? I backup! It is IT Security’s problem
  • 3. Protecting Clients’ Assets and Brand Reputation IT Security Components • • • • • • Users cooperation and compliance Antivirus Patching Education Intrusion Detection Firewalls
  • 4. Protecting Clients’ Assets and Brand Reputation The Threats • • • • • • • Malware, worms, trojans, spyware Hacking and network scanning Not Patching Social Engineering Chat and IM Weak passwords Unawareness
  • 5. Protecting Clients’ Assets and Brand Reputation What can you do? • • • • • • • Report incidents to your security officers Use strong passwords Email use and security Backup regularly Internet security Mobile Devices Physical Security
  • 6. Protecting Clients’ Assets and Brand Reputation • • • • • • • Use up to date antivirus software Use your locks, both physical and software Don’t use P2P file sharing software Don’t reveal confidential information Patch OS and Applications Use firewalls Don’t tell passwords
  • 7. Protecting Clients’ Assets and Brand Reputation • • • • • • Safe computing Add-ones to internet browsers Add-ons to email clients Aftermarket screensavers IMsoftware If you have been compromised change ALL your passwords.
  • 8. Protecting Clients’ Assets and Brand Reputation Antivirus Policy • All networked machines must run some form of Anti Virus • Infected computers will be removed from the network until cleaned • What about at home?
  • 9. Protecting Clients’ Assets and Brand Reputation Mobile Security • • • • • Password protection Encryption Physical Security Wireless Remote access
  • 10. Protecting Clients’ Assets and Brand Reputation Data Security • Data and You – Protection of sensitive data • Identity Theft & Phishing – Don’t be a victim • Physical Security
  • 11. Protecting Clients’ Assets and Brand Reputation Ways to protect yourself at home • • • • • • • • • • • WiFi Security Antivirus Backup! Passwords Bank & Credit Card data Firewall Patching OS Patches Instant Messaging Email Encryption
  • 12. Problems, Questions and Solutions Protecting Clients’ Assets and Brand Reputation • Call the Hedgehog Security team on – 01782 467900
  • 13. Protecting Clients’ Assets and Brand Reputation Links • Information Security • Penetration Testing • Your Infosec Team