SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Erlach Computer Consulting




     Serving Reno since 1998
A Little Bit About Erlach
• Establish in April 1998
• 7 employees (5 technical, 1 admin and Me)
• Primary market Reno/Sparks
• We provide the professional services needed
  to keep your network running smoothly, your
  data safe and your people productive.
• We are your IT department
Security and the Cloud
   The Three Vectors for Threats




The Cloud     Transit    End User
                         Devices
The Cloud

• Defined:
  – Cloud computing is the delivery of computing as a
    service rather than a product, whereby shared
    resources, software, and information are provided
    to computers and other devices as a utility (like
    the electricity grid) over a network (typically the
    Internet). - Wikipedia
The Cloud

• Issues
  – Data loss
  – Improper Access
  – Privacy (http://www.youtube.com/watch?v=TDbrX5U75dk)
  – Ownership
  – Physical Security
Transit

• Defined:
  – Data as it travels from a network node (E.g. End
    User Device) to another network node (E.g. The
    Cloud or another End User Device).
Transit

• Low risk of data theft, loss or corruption.

• Data at rest is more at risk than data in transit.

• Higher risk of interruption and downtime.
End User Device
• Defined:
  – These are the devices that the end user employs
    to access, manipulate and update data.

  – PCs, Smart Phones, Tablets
  – Also watches, game stations, blu-ray players, etc…
End User Device
• This is the area of highest risk, and for which
  you have the most control.
  – Passwords/Passcodes
  – Encryption
  – Recovery and wipe tools
  – Company culture
  – Anti-virus/anti-malware
Additional Resources
•   ABCs of Cloud-Based Security
•   How To Encrypt Your Smartphone
•   www.icloud.com
•   www.avgmobilation.com
•   www.LocateMyDroid.com
•   www.windowsphone.com
• www.sharefile.com
• Gmail Man on Youtube
Erlach Computer Consulting
• 8545 Double R Blvd., Ste 103
• Reno, NV 89521

• 775-332-3282

• www.erlach.com

• An IT Management Firm

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction of ICT
Introduction  of ICTIntroduction  of ICT
Introduction of ICTAmit Singh
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMSCharles Stevenson
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internetFrankie Jones
 
Transmission media
Transmission mediaTransmission media
Transmission mediaFazailAhmad2
 
Application of security computer
Application of security computerApplication of security computer
Application of security computeribrahimzubairu2003
 
Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to TechnologyCarolyn Brockman
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information TechnologyRa'Fat Al-Msie'deen
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolMuhammadRobeel3
 
The information technology revolution
The information technology revolutionThe information technology revolution
The information technology revolutiongomezcarla
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 

Was ist angesagt? (20)

Introduction of ICT
Introduction  of ICTIntroduction  of ICT
Introduction of ICT
 
ict 1 udom
ict 1 udomict 1 udom
ict 1 udom
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
Introduction of it by wikki verma - Wikki Verma
Introduction of it by wikki verma - Wikki VermaIntroduction of it by wikki verma - Wikki Verma
Introduction of it by wikki verma - Wikki Verma
 
Dc16 ch02
Dc16 ch02Dc16 ch02
Dc16 ch02
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Pricavy issues
Pricavy issuesPricavy issues
Pricavy issues
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to Technology
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
Intro chapter 01_a
Intro chapter 01_aIntro chapter 01_a
Intro chapter 01_a
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
English work
English workEnglish work
English work
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocol
 
The information technology revolution
The information technology revolutionThe information technology revolution
The information technology revolution
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Uc14 chap07
Uc14 chap07Uc14 chap07
Uc14 chap07
 

Andere mochten auch

Fabasoft at go international.at (November 2010)
Fabasoft at go international.at (November 2010)Fabasoft at go international.at (November 2010)
Fabasoft at go international.at (November 2010)Fabasoft eGov Suite
 
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business Serve...
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business  Serve...Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business  Serve...
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business Serve...Chad Massaker
 
OpenStack 101 Presentation
OpenStack 101 PresentationOpenStack 101 Presentation
OpenStack 101 PresentationEVault
 
Mhta.private.cloud.final.16.9
Mhta.private.cloud.final.16.9Mhta.private.cloud.final.16.9
Mhta.private.cloud.final.16.9Virteva Inc.
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsHigh Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsQuEST Global (erstwhile NeST Software)
 
Connectin - An Enterprise Knowledge Management Solution
Connectin - An Enterprise Knowledge Management SolutionConnectin - An Enterprise Knowledge Management Solution
Connectin - An Enterprise Knowledge Management SolutionAssyst International Pvt Ltd.
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemMahindra Comviva
 
Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile FirstCoreMedia
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions
 
Get Your Head in the Cloud
Get Your Head in the CloudGet Your Head in the Cloud
Get Your Head in the CloudClaris Networks
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comContrast Security
 
Arise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise International
 
KPN Getronics Portfolio informatie
KPN Getronics Portfolio informatieKPN Getronics Portfolio informatie
KPN Getronics Portfolio informatieKPN Getronics
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0AccelOps
 

Andere mochten auch (19)

Agile - Scrum
Agile - ScrumAgile - Scrum
Agile - Scrum
 
Fabasoft at go international.at (November 2010)
Fabasoft at go international.at (November 2010)Fabasoft at go international.at (November 2010)
Fabasoft at go international.at (November 2010)
 
KServe Retail Outlet
KServe Retail OutletKServe Retail Outlet
KServe Retail Outlet
 
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business Serve...
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business  Serve...Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business  Serve...
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business Serve...
 
OpenStack 101 Presentation
OpenStack 101 PresentationOpenStack 101 Presentation
OpenStack 101 Presentation
 
Mhta.private.cloud.final.16.9
Mhta.private.cloud.final.16.9Mhta.private.cloud.final.16.9
Mhta.private.cloud.final.16.9
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsHigh Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming Paradigms
 
Connectin - An Enterprise Knowledge Management Solution
Connectin - An Enterprise Knowledge Management SolutionConnectin - An Enterprise Knowledge Management Solution
Connectin - An Enterprise Knowledge Management Solution
 
2014 Ecommerce Holiday Prep
2014 Ecommerce Holiday Prep2014 Ecommerce Holiday Prep
2014 Ecommerce Holiday Prep
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone System
 
Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile First
 
Christmas 2015
Christmas 2015Christmas 2015
Christmas 2015
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development Company
 
Get Your Head in the Cloud
Get Your Head in the CloudGet Your Head in the Cloud
Get Your Head in the Cloud
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.com
 
Real time analytics-inthe_cloud
Real time analytics-inthe_cloudReal time analytics-inthe_cloud
Real time analytics-inthe_cloud
 
Arise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise EMEA - My Story Video Contest
Arise EMEA - My Story Video Contest
 
KPN Getronics Portfolio informatie
KPN Getronics Portfolio informatieKPN Getronics Portfolio informatie
KPN Getronics Portfolio informatie
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
 

Ähnlich wie ECC Cloud and Security

2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLDJack Kessler
 
marketing information system-chapter three
marketing information system-chapter threemarketing information system-chapter three
marketing information system-chapter threeHailemariam Kebede
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to rememberIszamli Jailani
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgEric Vanderburg
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery Brian Pichman
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy cscHisyam Rosly
 

Ähnlich wie ECC Cloud and Security (20)

2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
 
marketing information system-chapter three
marketing information system-chapter threemarketing information system-chapter three
marketing information system-chapter three
 
chp 3.ppt
chp 3.pptchp 3.ppt
chp 3.ppt
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Network security
Network securityNetwork security
Network security
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Network security
Network securityNetwork security
Network security
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 
Quality of information
Quality of informationQuality of information
Quality of information
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy csc
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

ECC Cloud and Security

  • 1. Erlach Computer Consulting Serving Reno since 1998
  • 2. A Little Bit About Erlach • Establish in April 1998 • 7 employees (5 technical, 1 admin and Me) • Primary market Reno/Sparks • We provide the professional services needed to keep your network running smoothly, your data safe and your people productive. • We are your IT department
  • 3. Security and the Cloud The Three Vectors for Threats The Cloud Transit End User Devices
  • 4. The Cloud • Defined: – Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). - Wikipedia
  • 5. The Cloud • Issues – Data loss – Improper Access – Privacy (http://www.youtube.com/watch?v=TDbrX5U75dk) – Ownership – Physical Security
  • 6. Transit • Defined: – Data as it travels from a network node (E.g. End User Device) to another network node (E.g. The Cloud or another End User Device).
  • 7. Transit • Low risk of data theft, loss or corruption. • Data at rest is more at risk than data in transit. • Higher risk of interruption and downtime.
  • 8. End User Device • Defined: – These are the devices that the end user employs to access, manipulate and update data. – PCs, Smart Phones, Tablets – Also watches, game stations, blu-ray players, etc…
  • 9. End User Device • This is the area of highest risk, and for which you have the most control. – Passwords/Passcodes – Encryption – Recovery and wipe tools – Company culture – Anti-virus/anti-malware
  • 10. Additional Resources • ABCs of Cloud-Based Security • How To Encrypt Your Smartphone • www.icloud.com • www.avgmobilation.com • www.LocateMyDroid.com • www.windowsphone.com • www.sharefile.com • Gmail Man on Youtube
  • 11. Erlach Computer Consulting • 8545 Double R Blvd., Ste 103 • Reno, NV 89521 • 775-332-3282 • www.erlach.com • An IT Management Firm