SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Computer Security

is anything less than 100% -
      “good enough”?




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
how secure is “secure”?

exactly what are the threats out there?

why are “they” doing it?

what is necessary to protect your
business?




         Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what are risks?
data loss

public relations issues

regulatory non-compliance

legal exposure

productivity loss

unnecessary expense




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
if you are connected to the internet, the
      internet is connected to you




          Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
so, what is “out there”?

    Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
spyware
spam



                                                                          phishing


                              intrusion
       s
 viru



           cyber-threats

        Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
targeted




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
to whom it may concern




   Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
but why & who?




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
political reasons




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
money!
Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
So far...



we know what the threats are
who is doing it
why




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
so, what is “good enough”?

     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
is there such thing as “good enough”
when it comes to network security?
are periodic signature updates OK?

should you allow portable media? company “policy”

how long could your organization go without email?

do you know if any of your computers are already compromised?

should you filter content?

is your public wireless network segregated?

how safe is “cloud” storage?

how much illegal software is on your company network?



                 Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
security basics
firewall
intrusion detection
anti-virus
anti-spam
anti-spyware
content filter (web browsing)
data leakage prevention




     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what should a manager do?

each business must carefully evaluate
circumstances
look long and hard at current and
future data
determine where and how to store
data
budget



         Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
security
diy or hire someone?




                                    or




 Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what do we know now?

every computer that ever connects
to the internet is at risk
the risks run 24/7/365 and... they
are constantly changing
effective security is not difficult or
expensive




        Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
books? - what’s a book?




   Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
how do kids learn today?




    Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
blue reef sonar
  Makes students accountable for the time they spend on the internet

  Protects laptops even when not on the school network

  Support and manage ALL devices - even Apple, iOS, Android, Windows,
Linux, MacOS - with a single log-on

  Teachers can open blocked web sites without involving IT

  Monitor chats, social networking

  Cyber bullying solutions

  STOP anonymous proxies...


if you know a school - do them a favor - tell them
        about Sonar - they will thank you


                     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
ขอบคุณมากๆ

  thank you




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok

Weitere ähnliche Inhalte

Was ist angesagt?

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingDDoS Mitigation
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of ThingsDaren Dunkel
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bwBridgetteWilliams15
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladeshTaibul Islam Tushar
 
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeAhmed Banafa
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemAM Publications,India
 

Was ist angesagt? (20)

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
 
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
 
IoT
IoTIoT
IoT
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
 

Ähnlich wie Is 100% Computer Security Good Enough

Future of Web Apps
Future of Web AppsFuture of Web Apps
Future of Web AppsTony Fish
 
How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobileCarsonified Team
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile WorkshopTony Fish
 
uniqueness of mobile
uniqueness of mobileuniqueness of mobile
uniqueness of mobileTony Fish
 
Power of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionPower of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionSoftware Park Thailand
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxAdvance Tech
 
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxFundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxshericehewat
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetAbhinav Mishra
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve ThemInnofied Solution
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentationneelyworthwhile
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute247 Invest
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 

Ähnlich wie Is 100% Computer Security Good Enough (20)

Future of Web Apps
Future of Web AppsFuture of Web Apps
Future of Web Apps
 
How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobile
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile Workshop
 
How To Use It With Safe
How To Use It With SafeHow To Use It With Safe
How To Use It With Safe
 
uniqueness of mobile
uniqueness of mobileuniqueness of mobile
uniqueness of mobile
 
Power of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionPower of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology Adoption
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docx
 
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxFundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
What is ethical hacking
What is ethical hackingWhat is ethical hacking
What is ethical hacking
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentation
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Is 100% Computer Security Good Enough

  • 1. Computer Security is anything less than 100% - “good enough”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 2. Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 3. how secure is “secure”? exactly what are the threats out there? why are “they” doing it? what is necessary to protect your business? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 4. what are risks? data loss public relations issues regulatory non-compliance legal exposure productivity loss unnecessary expense Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 5. if you are connected to the internet, the internet is connected to you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 6. so, what is “out there”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 7. spyware spam phishing intrusion s viru cyber-threats Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 8. targeted Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 9. to whom it may concern Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 10. but why & who? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 11. political reasons Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 12. money! Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 13. So far... we know what the threats are who is doing it why Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 14. so, what is “good enough”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 15. is there such thing as “good enough” when it comes to network security? are periodic signature updates OK? should you allow portable media? company “policy” how long could your organization go without email? do you know if any of your computers are already compromised? should you filter content? is your public wireless network segregated? how safe is “cloud” storage? how much illegal software is on your company network? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 16. security basics firewall intrusion detection anti-virus anti-spam anti-spyware content filter (web browsing) data leakage prevention Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 17. what should a manager do? each business must carefully evaluate circumstances look long and hard at current and future data determine where and how to store data budget Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 18. security diy or hire someone? or Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 19. what do we know now? every computer that ever connects to the internet is at risk the risks run 24/7/365 and... they are constantly changing effective security is not difficult or expensive Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 20. books? - what’s a book? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 21. how do kids learn today? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 22. blue reef sonar Makes students accountable for the time they spend on the internet Protects laptops even when not on the school network Support and manage ALL devices - even Apple, iOS, Android, Windows, Linux, MacOS - with a single log-on Teachers can open blocked web sites without involving IT Monitor chats, social networking Cyber bullying solutions STOP anonymous proxies... if you know a school - do them a favor - tell them about Sonar - they will thank you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 23. ขอบคุณมากๆ thank you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok