SlideShare uma empresa Scribd logo
1 de 13
Protecting Clients’ Assets and Brand Reputation

Information Security
Workshop
Protecting Clients’ Assets and Brand Reputation

Fallacies of Information Security
•
•
•
•
•

We have anti-virus software, so we are secure
We have a firewall, we are secure
The most serious threats come from outside
Security? I backup!
It is IT Security’s problem
Protecting Clients’ Assets and Brand Reputation

IT Security Components
•
•
•
•
•
•

Users cooperation and compliance
Antivirus
Patching
Education
Intrusion Detection
Firewalls
Protecting Clients’ Assets and Brand Reputation

The Threats
•
•
•
•
•
•
•

Malware, worms, trojans, spyware
Hacking and network scanning
Not Patching
Social Engineering
Chat and IM
Weak passwords
Unawareness
Protecting Clients’ Assets and Brand Reputation

What can you do?
•
•
•
•
•
•
•

Report incidents to your security officers
Use strong passwords
Email use and security
Backup regularly
Internet security
Mobile Devices
Physical Security
Protecting Clients’ Assets and Brand Reputation

•
•
•
•
•
•
•

Use up to date antivirus software
Use your locks, both physical and software
Don’t use P2P file sharing software
Don’t reveal confidential information
Patch OS and Applications
Use firewalls
Don’t tell passwords
Protecting Clients’ Assets and Brand Reputation

•
•
•
•
•
•

Safe computing
Add-ones to internet browsers
Add-ons to email clients
Aftermarket screensavers
IMsoftware
If you have been compromised
change ALL your passwords.
Protecting Clients’ Assets and Brand Reputation

Antivirus Policy
• All networked machines must run some form
of Anti Virus
• Infected computers will be removed from the
network until cleaned
• What about at home?
Protecting Clients’ Assets and Brand Reputation

Mobile Security
•
•
•
•
•

Password protection
Encryption
Physical Security
Wireless
Remote access
Protecting Clients’ Assets and Brand Reputation

Data Security
• Data and You – Protection of sensitive data
• Identity Theft & Phishing – Don’t be a victim
• Physical Security
Protecting Clients’ Assets and Brand Reputation

Ways to protect yourself at home
•
•
•
•
•
•
•
•
•
•
•

WiFi Security
Antivirus
Backup!
Passwords
Bank & Credit Card data
Firewall
Patching
OS Patches
Instant Messaging
Email
Encryption
Problems, Questions and Solutions
Protecting Clients’ Assets and Brand Reputation

• Call the Hedgehog Security team on
– 01782 467900
Protecting Clients’ Assets and Brand Reputation

Links
• Information Security
• Penetration Testing
• Your Infosec Team

Mais conteúdo relacionado

Mais procurados

OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)Michael Furman
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Information security
Information securityInformation security
Information securitylinalona515
 
Hacker
HackerHacker
Hackerezairy
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhdtopiccom
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basicsanandraje
 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification CourseNovel Vista
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Symantec 賽門鐵克產線機台防護方案建議
Symantec 賽門鐵克產線機台防護方案建議Symantec 賽門鐵克產線機台防護方案建議
Symantec 賽門鐵克產線機台防護方案建議Randy Lin
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and AbuseAlbrecht Jones
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 

Mais procurados (20)

OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Computer network
Computer networkComputer network
Computer network
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Information security
Information securityInformation security
Information security
 
Hacker
HackerHacker
Hacker
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Computer security
Computer securityComputer security
Computer security
 
PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-Computing
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification Course
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Symantec 賽門鐵克產線機台防護方案建議
Symantec 賽門鐵克產線機台防護方案建議Symantec 賽門鐵克產線機台防護方案建議
Symantec 賽門鐵克產線機台防護方案建議
 
9 - Security
9 - Security9 - Security
9 - Security
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 

Semelhante a Information security workshop

Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?VRS Technologies
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxKAVYAC21
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptRAJESH S
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaWikki Verma
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 

Semelhante a Information security workshop (20)

IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Information security workshop

  • 1. Protecting Clients’ Assets and Brand Reputation Information Security Workshop
  • 2. Protecting Clients’ Assets and Brand Reputation Fallacies of Information Security • • • • • We have anti-virus software, so we are secure We have a firewall, we are secure The most serious threats come from outside Security? I backup! It is IT Security’s problem
  • 3. Protecting Clients’ Assets and Brand Reputation IT Security Components • • • • • • Users cooperation and compliance Antivirus Patching Education Intrusion Detection Firewalls
  • 4. Protecting Clients’ Assets and Brand Reputation The Threats • • • • • • • Malware, worms, trojans, spyware Hacking and network scanning Not Patching Social Engineering Chat and IM Weak passwords Unawareness
  • 5. Protecting Clients’ Assets and Brand Reputation What can you do? • • • • • • • Report incidents to your security officers Use strong passwords Email use and security Backup regularly Internet security Mobile Devices Physical Security
  • 6. Protecting Clients’ Assets and Brand Reputation • • • • • • • Use up to date antivirus software Use your locks, both physical and software Don’t use P2P file sharing software Don’t reveal confidential information Patch OS and Applications Use firewalls Don’t tell passwords
  • 7. Protecting Clients’ Assets and Brand Reputation • • • • • • Safe computing Add-ones to internet browsers Add-ons to email clients Aftermarket screensavers IMsoftware If you have been compromised change ALL your passwords.
  • 8. Protecting Clients’ Assets and Brand Reputation Antivirus Policy • All networked machines must run some form of Anti Virus • Infected computers will be removed from the network until cleaned • What about at home?
  • 9. Protecting Clients’ Assets and Brand Reputation Mobile Security • • • • • Password protection Encryption Physical Security Wireless Remote access
  • 10. Protecting Clients’ Assets and Brand Reputation Data Security • Data and You – Protection of sensitive data • Identity Theft & Phishing – Don’t be a victim • Physical Security
  • 11. Protecting Clients’ Assets and Brand Reputation Ways to protect yourself at home • • • • • • • • • • • WiFi Security Antivirus Backup! Passwords Bank & Credit Card data Firewall Patching OS Patches Instant Messaging Email Encryption
  • 12. Problems, Questions and Solutions Protecting Clients’ Assets and Brand Reputation • Call the Hedgehog Security team on – 01782 467900
  • 13. Protecting Clients’ Assets and Brand Reputation Links • Information Security • Penetration Testing • Your Infosec Team