SlideShare uma empresa Scribd logo
1 de 15
Secure Your Business!A Blueprint for a Healthy Technology Plan   2009 Presented by: Robert CioffiDirector of Technology rcioffi@pro-comp.com Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
Installing confidencein your network We are Trusted Technology Advisors for small and mid-sized businesses throughout the NYC metro area. We design, install and maintainMicrosoft Windows based networks. We help customers who are…  Overwhelmed or confused by technology problems.  Frustrated by poor and unresponsive support.  Feeling helpless when faced with new IT challenges. www.pro-comp.com 2
Secure Your Business: Objectives ,[object Object],What are the potential threats to my financial transactions, intellectual property, customer database, images, etc? ,[object Object],What are the dynamic forces affecting IT? ,[object Object],How do I protect my business? 3 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
Secure Your Business: IT Mgmt Mistakes It’s the economy, stupid! “Companies using their 2009 performance as a guide are more likely to see 2010 as another down year, perhaps even lower than 2008…” “…unlike past recessions, CIOs report that transaction and storage volumes continue to grow.  This means that enterprises have to work smarter by working in new ways than working harder by doing more with less. ” Source: Gartner, The context for 2010 planning will be challenging, June 22, 2009 Pressure leads to Mistakes IT is a Cost Center Hyper focus on apps IT is not well understood If it ain’t broke, don’t fix it 4 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
Secure Your Business: Traditional Threats Recent Focus } Most Common F.U.D. Most Dangerous 5 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
Secure Your Business: Threats 2009 Specific threats affecting business… Phishing Attacks Spyware Computer Abuse Data Leakage (Accidental) Data Loss (Malicious) Theft & Loss Rising Costs & Less Resources 6 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
Secure Your Business: Budgets Data Protection Access Controls Risk Assessmentprovides clear direction onResource Expenditures Power Asset Protection Threat Mgmt Policies & Procedures 7 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
Secure Your Business: Data Protection What’s the most important part of your computer system? The Data! What’s the right way to protect my data? Traditional Innovative HYBRID 8 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
Secure Your Business: Data Protection Data Protection Technologies – 2009/10 Server Virtualization  Reduce cost. ,[object Object]
 Greater system availability.Online Backups ,[object Object]
 Versioning and quick recovery.
 Low operating costs.9 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
Secure Your Business: Power Rising costs of energy saps business. Datacenters are running out of power ,[object Object]
 Government regulations making it harder.
 Microsoft acquires local power plant for datacenter.Do more with less – Virtualization? US power: Prone to failure & attack 10 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.

Mais conteúdo relacionado

Mais procurados

10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementMafazo: Digital Solutions
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)GuardEra Access Solutions, Inc.
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysisCarlo Dapino
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 

Mais procurados (19)

10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Duncan hine input1_irm_and_outsourcing
Duncan hine input1_irm_and_outsourcingDuncan hine input1_irm_and_outsourcing
Duncan hine input1_irm_and_outsourcing
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 

Destaque

Td Presentation
Td PresentationTd Presentation
Td Presentationnamphonghn
 
The New Online
The New OnlineThe New Online
The New OnlineRCioffi
 
Td Presentation
Td PresentationTd Presentation
Td Presentationnamphonghn
 
Lenticular Printing
Lenticular PrintingLenticular Printing
Lenticular PrintingKai Yu
 
Neumann 24727 B10.12 Update 20091029 AM R3
Neumann 24727 B10.12 Update 20091029 AM R3Neumann 24727 B10.12 Update 20091029 AM R3
Neumann 24727 B10.12 Update 20091029 AM R3Agile Set, LLC
 
Letter Of Credit
Letter Of CreditLetter Of Credit
Letter Of Creditnamphonghn
 
Smart Cards In The USA
Smart Cards In The USASmart Cards In The USA
Smart Cards In The USAAgile Set, LLC
 
Engineering Chemistry Thesis Presentation (PowerPoint 2007)
Engineering Chemistry Thesis Presentation (PowerPoint 2007)Engineering Chemistry Thesis Presentation (PowerPoint 2007)
Engineering Chemistry Thesis Presentation (PowerPoint 2007)shanan84
 
Generating traffic on the mobile channel in developing market
Generating traffic on the mobile channel in developing marketGenerating traffic on the mobile channel in developing market
Generating traffic on the mobile channel in developing marketMahesh Amarasiri
 
Can Sri Lankan Telcos be relevant to the customers in the days of Google, Sky...
Can Sri Lankan Telcos be relevant to the customers in the days of Google, Sky...Can Sri Lankan Telcos be relevant to the customers in the days of Google, Sky...
Can Sri Lankan Telcos be relevant to the customers in the days of Google, Sky...Mahesh Amarasiri
 
Los 10 Tenistas Con Mas Grand Slams
Los 10 Tenistas Con Mas Grand SlamsLos 10 Tenistas Con Mas Grand Slams
Los 10 Tenistas Con Mas Grand Slamsguest16ce2aa
 
Technical Document Print and Translation
Technical Document Print and TranslationTechnical Document Print and Translation
Technical Document Print and TranslationCrestec USA
 
Reduce Print, Marketing and Documention costs
Reduce Print, Marketing and Documention costsReduce Print, Marketing and Documention costs
Reduce Print, Marketing and Documention costsCrestec USA
 
Chris Career Caddy
Chris Career CaddyChris Career Caddy
Chris Career Caddyniftyswell
 

Destaque (18)

Td Presentation
Td PresentationTd Presentation
Td Presentation
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
The New Online
The New OnlineThe New Online
The New Online
 
Td Presentation
Td PresentationTd Presentation
Td Presentation
 
On The Day I Was Born
On The Day I Was BornOn The Day I Was Born
On The Day I Was Born
 
Lenticular Printing
Lenticular PrintingLenticular Printing
Lenticular Printing
 
Neumann 24727 B10.12 Update 20091029 AM R3
Neumann 24727 B10.12 Update 20091029 AM R3Neumann 24727 B10.12 Update 20091029 AM R3
Neumann 24727 B10.12 Update 20091029 AM R3
 
Letter Of Credit
Letter Of CreditLetter Of Credit
Letter Of Credit
 
Smart Cards In The USA
Smart Cards In The USASmart Cards In The USA
Smart Cards In The USA
 
Engineering Chemistry Thesis Presentation (PowerPoint 2007)
Engineering Chemistry Thesis Presentation (PowerPoint 2007)Engineering Chemistry Thesis Presentation (PowerPoint 2007)
Engineering Chemistry Thesis Presentation (PowerPoint 2007)
 
Mnp
MnpMnp
Mnp
 
Selling Mobile Broadband
Selling Mobile BroadbandSelling Mobile Broadband
Selling Mobile Broadband
 
Generating traffic on the mobile channel in developing market
Generating traffic on the mobile channel in developing marketGenerating traffic on the mobile channel in developing market
Generating traffic on the mobile channel in developing market
 
Can Sri Lankan Telcos be relevant to the customers in the days of Google, Sky...
Can Sri Lankan Telcos be relevant to the customers in the days of Google, Sky...Can Sri Lankan Telcos be relevant to the customers in the days of Google, Sky...
Can Sri Lankan Telcos be relevant to the customers in the days of Google, Sky...
 
Los 10 Tenistas Con Mas Grand Slams
Los 10 Tenistas Con Mas Grand SlamsLos 10 Tenistas Con Mas Grand Slams
Los 10 Tenistas Con Mas Grand Slams
 
Technical Document Print and Translation
Technical Document Print and TranslationTechnical Document Print and Translation
Technical Document Print and Translation
 
Reduce Print, Marketing and Documention costs
Reduce Print, Marketing and Documention costsReduce Print, Marketing and Documention costs
Reduce Print, Marketing and Documention costs
 
Chris Career Caddy
Chris Career CaddyChris Career Caddy
Chris Career Caddy
 

Semelhante a Secure Your Business 2009

David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Global Business Events
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ EnterprisesNigel Hanson
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Managementguest64c5c
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceIBM Danmark
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptxSonaliG6
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 

Semelhante a Secure Your Business 2009 (20)

David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Management
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security Intelligence
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 

Secure Your Business 2009

  • 1. Secure Your Business!A Blueprint for a Healthy Technology Plan 2009 Presented by: Robert CioffiDirector of Technology rcioffi@pro-comp.com Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 2. Installing confidencein your network We are Trusted Technology Advisors for small and mid-sized businesses throughout the NYC metro area. We design, install and maintainMicrosoft Windows based networks. We help customers who are…  Overwhelmed or confused by technology problems.  Frustrated by poor and unresponsive support.  Feeling helpless when faced with new IT challenges. www.pro-comp.com 2
  • 3.
  • 4. Secure Your Business: IT Mgmt Mistakes It’s the economy, stupid! “Companies using their 2009 performance as a guide are more likely to see 2010 as another down year, perhaps even lower than 2008…” “…unlike past recessions, CIOs report that transaction and storage volumes continue to grow.  This means that enterprises have to work smarter by working in new ways than working harder by doing more with less. ” Source: Gartner, The context for 2010 planning will be challenging, June 22, 2009 Pressure leads to Mistakes IT is a Cost Center Hyper focus on apps IT is not well understood If it ain’t broke, don’t fix it 4 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 5. Secure Your Business: Traditional Threats Recent Focus } Most Common F.U.D. Most Dangerous 5 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 6. Secure Your Business: Threats 2009 Specific threats affecting business… Phishing Attacks Spyware Computer Abuse Data Leakage (Accidental) Data Loss (Malicious) Theft & Loss Rising Costs & Less Resources 6 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 7. Secure Your Business: Budgets Data Protection Access Controls Risk Assessmentprovides clear direction onResource Expenditures Power Asset Protection Threat Mgmt Policies & Procedures 7 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 8. Secure Your Business: Data Protection What’s the most important part of your computer system? The Data! What’s the right way to protect my data? Traditional Innovative HYBRID 8 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 9.
  • 10.
  • 11. Versioning and quick recovery.
  • 12. Low operating costs.9 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 13.
  • 14. Government regulations making it harder.
  • 15. Microsoft acquires local power plant for datacenter.Do more with less – Virtualization? US power: Prone to failure & attack 10 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 16.
  • 19. Response11 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 20. Secure Your Business: Access Controls Who Has Access to What? 1. Define resources, and users; what can they access? 2. Force users to enter logon credentials to access resources. 3. Segregate data into logical areas & assign appropriate access. 4. Passwords should be hard to guess & changed periodically. 5. Educate users about dangers of social engineering. 6. Periodically check for and install software patches & updates. 7. Bio-Scan Technology: Hand readers, Retina scanners, etc. Windows Group Policy is an excellent and powerful tool for implementing centralized Logical Security on your network: desktop lockdown, password policies, application options control, and more. 12 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 21.
  • 22. Restrict access to sensitive equipment to relevant personnel.
  • 23. Computer workstations can be secured to walls or furniture.
  • 24. Laptop users should keep an “eye” on their computer at all times.
  • 25.
  • 26. “Homing Pigeon” Software for lost or stolen equipment13 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 27.
  • 28. Should be routinely reviewed and revised.
  • 29. Good risk assessment will drive good security policies.
  • 30.
  • 32. Don’t Ask, Don’t Tell Passwords
  • 33. Policies are platitudes rather than a decision or direction
  • 34. Too restrictive – people bypass14 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.
  • 35. Secure Your Business! Q & A 15 Copyright © 2009, Robert Cioffi, Progressive Computing Inc.