SlideShare a Scribd company logo
1 of 8
Download to read offline
Is Your Union Office Cyber Safe?
Your Cybersecurity Planning Guide
unionbuiltpc.com
How to Implement A Cybersecurity Plan
A comprehensive cybersecurity plan needs to focus on 3 key areas:
 Prevention
Solutions, policies and procedures need to be identified to reduce
the risk of attacks.
 Resolution
In the event of a computer security breach, plans and procedures
need to be in place to determine the resources that will be used to
remedy a threat.
 Restitution
Unions need to be prepared to address the repercussions of a
security threat with their members and officers to ensure that any
loss of trust or downtime is minimal and short-lived.
In lieu of the recent Cyber Attacks on Corporations and Government Offices
we offer you the means to establish your own Cyber Security Plan. Union
Built PC stands ready to help any Union that requires assistance accomplishing
this via phone consultation or via our secure Systems or Software. The
alternative is to sit back until an attack occurs on your union office and
compromises not only your data but the security of your members’ data. You
must be Pro-Active NOT Re-Active.
A computer network assessment will help you begin a cybersecurity plan to
mitigate the largest risks to your Union.
Union Built PC recommends that unions start by having a strategic approach
to cybersecurity. Unions should take the same approach to safeguard their
membership and financial data. This strategic approach should include plans
to secure existing systems and keep your union secure going forward.
A Cybersecurity Plan for Your Union Office
Privacy and Data Security
Include this topic for information about data handling and protection, data
privacy, collecting data online, storage and security and lost or stolen data.
Does your union handle or store sensitive data or data that includes
personal information about your members or your Union Officers?
Scams and Fraud
Include this topic for information about phishing, social engineering, online
fraud, identity theft, malicious software, telephone scams and more.
All unions can be susceptible to scams and fraud. Therefore, we recommend
this topic be part of any basic cyber security plan. Do you wish to include
this section?
Network Security
Include this topic for information about computer networks, password
policies, secure wireless connections, encryption, remote access, Internet
access and more.
Does your union have an internal network - a group of computers connected
together – and/or a Wireless Local Area Network (e.g, a WiFi router)?
Website Security
Include this topic for information about securing a public website, including
server security, login and transaction encryption, Web applications, links and
redirects.
Does your union have a public website?
Email
Include this topic for information about filtering, union training, email
retention and management, and creating email policies.
Do you use either a union email account or personal email account to
conduct union or interact with Union Officers and/or members?
A Cybersecurity Plan for Your Union Office
Mobile Devices
Include this topic for information about mobile security practices, threats and
emergency preparedness planning for unions and their members.
Does your union use any Internet-connected mobile technology, such as
smartphones, laptops and tablets?
Members
Include this topic for information about hiring, member data, member dues,
access controls and security training.
Does your union have responsibility for security of members data?
Facility Security
Include this topic for information about your Union’s physical security,
including protection pf printed material, mail security and disposal of trash
and electronic equipment.
Does your union have physical assets that need to be protected, including
printed material and electronic equipment?
Operational Security
Include this topic for information about developing a plan to secure
information and networks critical to union operations.
Does your union store data that would be valuable to cyber criminals, such
as proprietary information valuable to your Union's operations or sensitive
customer data, such as personally identifiable information?
Incident Response and Reporting
Include this topic for information about phishing, social engineering, online
fraud, identity theft, malicious software, telephone scams and more.
All unions should include an understanding of how to respond to a cyber
attack as part of any basic cyber security plan, and thus we recommend you
include this section.
Hardware
 8GB Compact Flash
 Intel Core i5-2400 Processor –
Quad Core
 8GB (2 x 4GB)
 750GB: (2 x 750GB)
SATA Software RAID1 MIRRORED
Software
 Content Filter Updates,
Daily Updates
 Intrusion Protection Updates, Weekly
Updates
 Remote Security Audit,
Weekly audits
 Remote Server Backup, 10 GB
 Antispam Updates,
Daily Updates
 Antimalware Updates,
Daily Updates
 Remote System Monitor,
5-minute Notifications
 Dynamic VPN
 Dynamic DNS
 Account Synchronization
 Zarafa EMAIL Community Edition
Who Can Help with Your Cybersecurity?
UB-300
SHOP THE UB-300
DOWNLOAD SPECS
OR CALL 877-PC-UNION FOR SPECIAL PRICING
Your best sources of guidance are your Union Sisters and Brothers at Union
Built PC. Other sources include your Internet Service Provider (ISP) and
software providers.
The Union Built PC Recommendation for a Secure Office
The UB-300 Server running ClearOS Pro
with Maximum Intrusion Protection
Directory Server
MySQL Server
Active Directory
Connector
Advanced Print Server
Windows File Server
FTP Server
Flexshare
Windows Networking Email
IMAP & POP Server
SMTP Server
Messaging & Collaboration
Google Apps
Synchronization
Zarafa or Community
Web Server
Dynamic DNS
IP Settings
Multi-WAN
Network Visualizer
1-to-1 NAT
Custom Firewall
DMZ Firewall
Egress Firewall
Incoming Firewall
Port Forwarding DHCP
DNS Server
NTP Server
RADIUS Server
SSH Server
Dynamic VPN
Open VPN
PPTP Server
Antimalware
Protection
Gateway
Antiphishing
Gateway Antivirus
Kaspersky Gateway Antivirus
Advanced Content Filter
Web Access Control
Web Proxy
Intrusion Detection
Intrusion Prevention
Protocol Filter
The Union Built PC UB-300 Features
Welcome to the World of Hybrid Appliances
Router
Content Filter
Load Balancer
File Server
Web Server
Mail Server
Firewall
VPN
The new Union Built PC Model 300 offers an all-in-one server solution with seamless
integration of cloud and on-premise applications and services with increased security and
decreased complexity and cost, the UB-300 is the equivalent of running 8 devices in 1.
Two bypass ports create a fully redundant failover or load balanced system.
The Union Built PC UB-300 Specs
Dimensions
17.4”(W) x 11.5”(D) x 1.73”(H)
Processors
Intel® Core™ i3-2120 Processor Quad Core
Intel® Core™ i5-2400 Processor Quad Core
Intel® Core™ i7-2600 Processor Quad Core
Memory
Dual Channel DDR3 RAM 2 - 16GB
8GB Compact Flash For OS Restore
Storage
Solid State & SATA 500GB to 3TB
Software RAID I: 80GB (SSD) to 750GB
SATA, Mirrored
UB-300 Components
A. System Restore (In Development)
B. Bypass 2 LED Indicator
C. Bypass 1 LED Indicator
D. G2 Bypass Segment 1 w/ 2 1Gb Ethernet Ports
E. G2 Bypass Segment 2 w/ 2 1Gb Ethernet Ports
F. 2 1Gb Ethernet Ports
G. Dual USB 2.0 Ports
H. RJ45 System Console connector
I. Hard Drive Active LED
J. Power LED
K. Reset Button
L. 128x32 Graphic LCD Module
M. 4 button LCD Module Control
N. 200W Full-range ATX
O. On/Off Switch
P. Intelligent Cooling System
Q. VGA Port - Intel® H61 PCH with DMI 5GT
Chipset
R. One PCI-E x8 Expansion
Contact Us
Union Built PC Inc.
Pete Marchese
877-PC-UNION (728-6466)
pete.marchese@unionbuiltpc.com
www.unionbuiltpc.com
CALL 877-PC-UNION FOR SPECIAL PRICING ON THE UB-300
About Union Built PC
Union Built PC Inc. has been serving the IT
needs of Labor since 2001. Union Built PC’s
mission is to “organize” Labor and help
them “excel in everything they do.” Union
Built PC believes their success is based on
products and services that have been
developed by Union Members and
customized to meet the specific needs of
their Labor Union Clients. That’s why every
member of the Union Built PC team is a
Union Member.
The staff of Union Built PC, Inc. have been
members of many Local unions and Labor
organizations over the decades. Currently,
UBPC is organized by CWA Local 1101.
SHOP THE UB-300 DOWNLOAD SPECS

More Related Content

Viewers also liked

Instrumentos que componen las orquestas de plectro (para subir)
Instrumentos que componen las orquestas de plectro (para subir)Instrumentos que componen las orquestas de plectro (para subir)
Instrumentos que componen las orquestas de plectro (para subir)
Sandra Rivas Mazuecos
 

Viewers also liked (8)

Ncert-solutions-for-class9th-hindi-sparsh
Ncert-solutions-for-class9th-hindi-sparshNcert-solutions-for-class9th-hindi-sparsh
Ncert-solutions-for-class9th-hindi-sparsh
 
Instrumentos que componen las orquestas de plectro (para subir)
Instrumentos que componen las orquestas de plectro (para subir)Instrumentos que componen las orquestas de plectro (para subir)
Instrumentos que componen las orquestas de plectro (para subir)
 
Legalities of Social Media
Legalities of Social MediaLegalities of Social Media
Legalities of Social Media
 
Managing the legal risks: Social Media in the workplace
Managing the legal risks: Social Media in the workplaceManaging the legal risks: Social Media in the workplace
Managing the legal risks: Social Media in the workplace
 
Depone global
Depone globalDepone global
Depone global
 
GPportfolio
GPportfolioGPportfolio
GPportfolio
 
Primers and sealers
Primers and sealersPrimers and sealers
Primers and sealers
 
RAMP - Your way out of the modernisation maze
RAMP - Your way out of the modernisation mazeRAMP - Your way out of the modernisation maze
RAMP - Your way out of the modernisation maze
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Is Your Union Office Cyber Safe?

  • 1. Is Your Union Office Cyber Safe? Your Cybersecurity Planning Guide unionbuiltpc.com
  • 2. How to Implement A Cybersecurity Plan A comprehensive cybersecurity plan needs to focus on 3 key areas:  Prevention Solutions, policies and procedures need to be identified to reduce the risk of attacks.  Resolution In the event of a computer security breach, plans and procedures need to be in place to determine the resources that will be used to remedy a threat.  Restitution Unions need to be prepared to address the repercussions of a security threat with their members and officers to ensure that any loss of trust or downtime is minimal and short-lived. In lieu of the recent Cyber Attacks on Corporations and Government Offices we offer you the means to establish your own Cyber Security Plan. Union Built PC stands ready to help any Union that requires assistance accomplishing this via phone consultation or via our secure Systems or Software. The alternative is to sit back until an attack occurs on your union office and compromises not only your data but the security of your members’ data. You must be Pro-Active NOT Re-Active. A computer network assessment will help you begin a cybersecurity plan to mitigate the largest risks to your Union. Union Built PC recommends that unions start by having a strategic approach to cybersecurity. Unions should take the same approach to safeguard their membership and financial data. This strategic approach should include plans to secure existing systems and keep your union secure going forward.
  • 3. A Cybersecurity Plan for Your Union Office Privacy and Data Security Include this topic for information about data handling and protection, data privacy, collecting data online, storage and security and lost or stolen data. Does your union handle or store sensitive data or data that includes personal information about your members or your Union Officers? Scams and Fraud Include this topic for information about phishing, social engineering, online fraud, identity theft, malicious software, telephone scams and more. All unions can be susceptible to scams and fraud. Therefore, we recommend this topic be part of any basic cyber security plan. Do you wish to include this section? Network Security Include this topic for information about computer networks, password policies, secure wireless connections, encryption, remote access, Internet access and more. Does your union have an internal network - a group of computers connected together – and/or a Wireless Local Area Network (e.g, a WiFi router)? Website Security Include this topic for information about securing a public website, including server security, login and transaction encryption, Web applications, links and redirects. Does your union have a public website? Email Include this topic for information about filtering, union training, email retention and management, and creating email policies. Do you use either a union email account or personal email account to conduct union or interact with Union Officers and/or members?
  • 4. A Cybersecurity Plan for Your Union Office Mobile Devices Include this topic for information about mobile security practices, threats and emergency preparedness planning for unions and their members. Does your union use any Internet-connected mobile technology, such as smartphones, laptops and tablets? Members Include this topic for information about hiring, member data, member dues, access controls and security training. Does your union have responsibility for security of members data? Facility Security Include this topic for information about your Union’s physical security, including protection pf printed material, mail security and disposal of trash and electronic equipment. Does your union have physical assets that need to be protected, including printed material and electronic equipment? Operational Security Include this topic for information about developing a plan to secure information and networks critical to union operations. Does your union store data that would be valuable to cyber criminals, such as proprietary information valuable to your Union's operations or sensitive customer data, such as personally identifiable information? Incident Response and Reporting Include this topic for information about phishing, social engineering, online fraud, identity theft, malicious software, telephone scams and more. All unions should include an understanding of how to respond to a cyber attack as part of any basic cyber security plan, and thus we recommend you include this section.
  • 5. Hardware  8GB Compact Flash  Intel Core i5-2400 Processor – Quad Core  8GB (2 x 4GB)  750GB: (2 x 750GB) SATA Software RAID1 MIRRORED Software  Content Filter Updates, Daily Updates  Intrusion Protection Updates, Weekly Updates  Remote Security Audit, Weekly audits  Remote Server Backup, 10 GB  Antispam Updates, Daily Updates  Antimalware Updates, Daily Updates  Remote System Monitor, 5-minute Notifications  Dynamic VPN  Dynamic DNS  Account Synchronization  Zarafa EMAIL Community Edition Who Can Help with Your Cybersecurity? UB-300 SHOP THE UB-300 DOWNLOAD SPECS OR CALL 877-PC-UNION FOR SPECIAL PRICING Your best sources of guidance are your Union Sisters and Brothers at Union Built PC. Other sources include your Internet Service Provider (ISP) and software providers. The Union Built PC Recommendation for a Secure Office The UB-300 Server running ClearOS Pro with Maximum Intrusion Protection
  • 6. Directory Server MySQL Server Active Directory Connector Advanced Print Server Windows File Server FTP Server Flexshare Windows Networking Email IMAP & POP Server SMTP Server Messaging & Collaboration Google Apps Synchronization Zarafa or Community Web Server Dynamic DNS IP Settings Multi-WAN Network Visualizer 1-to-1 NAT Custom Firewall DMZ Firewall Egress Firewall Incoming Firewall Port Forwarding DHCP DNS Server NTP Server RADIUS Server SSH Server Dynamic VPN Open VPN PPTP Server Antimalware Protection Gateway Antiphishing Gateway Antivirus Kaspersky Gateway Antivirus Advanced Content Filter Web Access Control Web Proxy Intrusion Detection Intrusion Prevention Protocol Filter The Union Built PC UB-300 Features Welcome to the World of Hybrid Appliances Router Content Filter Load Balancer File Server Web Server Mail Server Firewall VPN The new Union Built PC Model 300 offers an all-in-one server solution with seamless integration of cloud and on-premise applications and services with increased security and decreased complexity and cost, the UB-300 is the equivalent of running 8 devices in 1.
  • 7. Two bypass ports create a fully redundant failover or load balanced system. The Union Built PC UB-300 Specs Dimensions 17.4”(W) x 11.5”(D) x 1.73”(H) Processors Intel® Core™ i3-2120 Processor Quad Core Intel® Core™ i5-2400 Processor Quad Core Intel® Core™ i7-2600 Processor Quad Core Memory Dual Channel DDR3 RAM 2 - 16GB 8GB Compact Flash For OS Restore Storage Solid State & SATA 500GB to 3TB Software RAID I: 80GB (SSD) to 750GB SATA, Mirrored UB-300 Components A. System Restore (In Development) B. Bypass 2 LED Indicator C. Bypass 1 LED Indicator D. G2 Bypass Segment 1 w/ 2 1Gb Ethernet Ports E. G2 Bypass Segment 2 w/ 2 1Gb Ethernet Ports F. 2 1Gb Ethernet Ports G. Dual USB 2.0 Ports H. RJ45 System Console connector I. Hard Drive Active LED J. Power LED K. Reset Button L. 128x32 Graphic LCD Module M. 4 button LCD Module Control N. 200W Full-range ATX O. On/Off Switch P. Intelligent Cooling System Q. VGA Port - Intel® H61 PCH with DMI 5GT Chipset R. One PCI-E x8 Expansion
  • 8. Contact Us Union Built PC Inc. Pete Marchese 877-PC-UNION (728-6466) pete.marchese@unionbuiltpc.com www.unionbuiltpc.com CALL 877-PC-UNION FOR SPECIAL PRICING ON THE UB-300 About Union Built PC Union Built PC Inc. has been serving the IT needs of Labor since 2001. Union Built PC’s mission is to “organize” Labor and help them “excel in everything they do.” Union Built PC believes their success is based on products and services that have been developed by Union Members and customized to meet the specific needs of their Labor Union Clients. That’s why every member of the Union Built PC team is a Union Member. The staff of Union Built PC, Inc. have been members of many Local unions and Labor organizations over the decades. Currently, UBPC is organized by CWA Local 1101. SHOP THE UB-300 DOWNLOAD SPECS