SlideShare uma empresa Scribd logo
1 de 50
www.smbcybersecurity.org
Protecting Customer
Confidential Information!
Presented by:
William McBorrough, MSIA, CISSP
SMB Cyber Security Alliance
www.smbcybersecurity.org
Agenda
 Background
 Sizing Up the Problem
 The Fix
o People Factor
o Technology
o Disposing of Old Data
Key Takeaways
SMB Cyber Security Alliance
www.smbcybersecurity.org
Background:
SMB Cyber Security Alliance
www.smbcybersecurity.org
Sensational Headlines…daily!
• Heartland Payments announced breach of more
than 100 million credit card numbers ( January
2009). One of the largest in history.
• T.J. Maxx data theft (some 45 million credit and
debit card numbers) likely due to wireless
‘wardriving‘, i.e. thief with a laptop, a telescope
antenna, and a wireless LAN adapter (December
2006).
SMB Cyber Security Alliance
www.smbcybersecurity.org
Sensational Headlines…Daily!
• Veterans Administration announces confidential
information of 26.5 million service personnel was
stolen when employee’s home laptop was stolen
(June 2006).
• Over 600,000 laptop thefts occurred in 2004,
totaling an estimated $720 million in hardware
losses and $5.4 billion in theft of proprietary
information.
SMB Cyber Security Alliance
www.smbcybersecurity.org
What’s not in the headlines?
A 2010 survey conducted by the Ponemon Institute and
Guardian Analytics of over 500 SMBs surfaced these
alarming statistics:
• 55% experienced a fraud attack in the last year
•58% of the incidents involved online banking
•Over 50% experienced multiple incidents
•87% failed to fully recover lost funds
SMB Cyber Security Alliance
www.smbcybersecurity.org
The Times are a Changing
• Most small business owners today depend on
Laptops and Tablet PCs to manage their businesses
on the go
• Most require ready access to the Internet while
working from home, office, hotels, airports, customer
sites, etc sites, etc.
• Most utilize smart phones capable email, web
browsing, storing data and detailed contact
information, etc
SMB Cyber Security Alliance
www.smbcybersecurity.org
The Times are a Changing
• Increase in mobility and portability has
caused a major upsurge in data breaches:
o Breaches may go undetected or undiscovered
for long periods of time.
o Problem could easily become overwhelming
(identity theft will look like child’s play).
SMB Cyber Security Alliance
www.smbcybersecurity.org
What are the Consequences?
• Damage to reputation, brand,
relationships
• Legal liability and regulatory fines
• Customer and stakeholder distrusts
• Reduced revenues and market share
• Refusal of customers to use their personal
information for business purposes
SMB Cyber Security Alliance
www.smbcybersecurity.org
Aware of the Privacy laws?
• HIPAA – for health services providers
• GLBA – for financial services providers
• COPPA – for online service providers to
minors
• Various State Breach Notification Laws
SMB Cyber Security Alliance
www.smbcybersecurity.org
Information Security Management
“Short List”
• Router
• Patches
• Anti-
o Virus
o Spam
o Spyware
• Passwords /
Passphrases
• Personal Firewall
• Network Firewall
• Intrusion Detection
• Web-based e-mail/
file sharing Protection
• Wireless Encryption
• Physical Access
Control
• Backups
SMB Cyber Security Alliance
www.smbcybersecurity.org
Security GOAL:
Reduce Risk to an Acceptable Level
• Just because it can happen doesn’t mean
it will.
• Put threats into perspective by assessing:
o Probability of attack
o Value of business assets put at risk
o Business cost and consequence of attack
SMB Cyber Security Alliance
www.smbcybersecurity.org
Sizing Up the
Problem:
SMB Cyber Security Alliance
www.smbcybersecurity.org
What is Confidential Data?
• Social Security #
• Credit/debit card numbers
• Driver’s license number
• Bank account numbers
• Birth dates
• PIN codes
• Medical records
• Mother’s maiden name?
SMB Cyber Security Alliance
www.smbcybersecurity.org
Where Is Confidential Data
Stored?
In-House Systems
• Physically secure?
• Network access restricted to only authorized
individuals?
Backup Media
• Physical location?
• Format?
Remote Users
• Laptops, home computers & memory sticks?
SMB Cyber Security Alliance
www.smbcybersecurity.org
Who Has Access?
• Data access restricted to authorized
individuals?
• Shared passwords = shared data and no
accountability
• Wide open network = information free-for-
all ( Remember 3 little pigs?)
SMB Cyber Security Alliance
www.smbcybersecurity.org
The Fix:
SMB Cyber Security Alliance
www.smbcybersecurity.org
The Fix!
• In short…
Restrict access
and/or
Make it unreadable
• Data is made “unreadable” using
encryption.
• Back it up remotely
SMB Cyber Security Alliance
www.smbcybersecurity.org
People Factor
Policy
• Who is allowed access?
• When is access allowed?
• What users are allowed to do?
• Where is data permitted to be…
o Accessed from (devices & locations?)
o Stored
 Network servers
 Desktops
 Laptops /Tablets/Smart Phones
 Thumb drives
SMB Cyber Security Alliance
www.smbcybersecurity.org
People Factor – Mitigating Risk
Acceptable Use Policies
• Business data access rules: who, where, when and what
• Supported mobile devices and operating systems
• Required security measures and configurations
• Process for usage monitoring, auditing and enforcement (check your
state and local laws)
Non-Disclosure Agreements (NDA)?
Training & Communication – regular and often?
Social Engineering
• “Click here” to download key logger!
• Phishing attacks are still highly effective for stealing
o Personal information
o Login information – can then be used to access systems contain confidential
data
SMB Cyber Security Alliance
www.smbcybersecurity.org
SMB Cyber Security Alliance
www.smbcybersecurity.org
SMB Cyber Security Alliance
www.smbcybersecurity.org
SMB Cyber Security Alliance
www.smbcybersecurity.org
Technology – OnSite
Physical security
• Sensitive data located on secure systems
• Locked server room
• Locker server cage(s)
SMB Cyber Security Alliance
www.smbcybersecurity.org
Storage Media
Hard drive encryption
• Vista BitLocker
o Encrypts entire Windows Operating System volume
o Available with:
 Vista Ultimate
 Vista Enterprise
• Third party, commercial encryption software
o TrueCrypt
o PGP Desktop Home
SMB Cyber Security Alliance
www.smbcybersecurity.org
Storage Media
USB Thumb Drives
• Most older drives completely
insecure
• If you want to store/transfer
secure data on USB thumb
drive, look for device that can…
o Encrypt data
o Authenticate user
SMB Cyber Security Alliance
www.smbcybersecurity.org
Authentication
• APC BIOMETRIC PASSWORD MANAGER
fingerprint reader - USB by APC ($35 - $50)
• Hundreds of devices like this ranging from $25 -
$300.
SMB Cyber Security Alliance
www.smbcybersecurity.org
Application Software
In general, application passwords are poor 
protection (since most can be broken)
• e.g. Passware (www.lostpassword.com)
• Unlock 25 different applications including
Windows, Office, Quick Books, Acrobat, Winzip,
etc.
SMB Cyber Security Alliance
www.smbcybersecurity.org
VPN (Virtual Private Network)
• A VPN is a private network that uses a
public network (usually the Internet) to
connect remote sites or users together.
Instead of using a dedicated, real-world
connection such as leased line, a VPN
uses “virtual” connections routed through
the Internet from the company's private
network to the remote site or employee.
SMB Cyber Security Alliance
www.smbcybersecurity.org
• Overview
SMB Cyber Security Alliance
www.smbcybersecurity.org
VPN (Virtual Private Network)
Benefits
• Extend geographic connectivity
• Reduce transit time and transportation costs for
remote users
• Provide telecommuter support
• Improve security
• Improve productivity
• Direct printing to office
• Direct connect to network drives
SMB Cyber Security Alliance
www.smbcybersecurity.org
VPN
• Use 3rd
-party VPN service, e.g.
HotSpotVPN, JiWire Spot Lock, Public
VPN or WiTopia Personal VPN
SMB Cyber Security Alliance
www.smbcybersecurity.org
Host-Based Remote Access
Remote Control
• GoToMyPC
• LogMeIn
• Symantec pcAnywhere
SMB Cyber Security Alliance
www.smbcybersecurity.org
Digital Certificates
• Implement digital certificates for internally
hosted corporate web resources or web-
presence, e.g. E-mail, CRM, B2? site, etc.
This allows all traffic to be encrypted via
SSL (Secure Sockets Layer).
o Pad lock indicates traffic is being encrypted
and the web site owner’s identity can be
verified (by certificate authority).
SMB Cyber Security Alliance
www.smbcybersecurity.org
Wireless Security – Network
• DON’T do a plug-n-play install!
• Password protect administrative setup
• Encryption:
o WEP – Easily cracked, better than nothing
o WPA (better)
o WPA2 (best)
• Enter authorized MAC addresses on WAP
SMB Cyber Security Alliance
www.smbcybersecurity.org
Wireless Security - End Users
• Ensure all mobile devices are updated with
the latest security patches
• Only use SSL enabled ( https) websites when
sending/entering sensitive data (credit cards
and personal identity information)
• Encrypt documents that contain sensitive data
that will be sent over the Internet
SMB Cyber Security Alliance
www.smbcybersecurity.org
Wireless Security - End Users
• As a general rule (while not always possible) use
WiFi for Internet surfing only
• Disable or remove wireless devices if they are
not being used. This includes:
o WiFi – 802.11a/b/g/n
o Bluetooth
o Infrared
o Cellular
• Avoid hotspots where it is difficult to tell who is
connected
• Ad-hoc/peer-to-peer setting should be disabledSMB Cyber Security Alliance
www.smbcybersecurity.org
WiFi Security - End Users
WiFi Best Practices
• Use broadband wireless access (EvDO,
3G/GPRS, EDGE, UMTS) to make wireless
connections:
o Verizon and Sprint Broadband services are very fast -
$59.99/month – unlimited access
o Wireless carriers offer fairly good encryption and
authentication
SMB Cyber Security Alliance
www.smbcybersecurity.org
Sharing Confidential Data
Options:
• E-mail
• FTP / Secure FTP
• Secure transmission programs
• Customer portal / extranet
• 3rd Party Hosted Data Exchange
SMB Cyber Security Alliance
www.smbcybersecurity.org
Sharing Confidential Data
E-mail
• As a general rule, e-mail is insecure!
• In order to secure:
o Digital Certificates / PKI
 PGP
 Verisign
SMB Cyber Security Alliance
www.smbcybersecurity.org
SMB Cyber Security Alliance
www.smbcybersecurity.org
Sharing Confidential Data
Client Extranets
• Internal
• Hosted
o e.g. ShareFile
 Branded!
 $100/mo.
 30 employees
 Unlimited clients
SMB Cyber Security Alliance
www.smbcybersecurity.org
SMB Cyber Security Alliance
www.smbcybersecurity.org
Back up All Valuable
Information
• Make sure it’s
encrypted
• Make sure it is stored
securely offsite
• Many options:
• Carbonite
• Mozy
• Norton
• PCIC
SMB Cyber Security Alliance
www.smbcybersecurity.org
Disposing of Confidential Data
• Remove media!
• Wipe media
o Software to overwrite
drive multiple times
o Permanent magnet
• Destroy media
o Semshred –
www.semshred.com
SMB Cyber Security Alliance
www.smbcybersecurity.org
Conclusion:
SMB Cyber Security Alliance
www.smbcybersecurity.org
Key Takeaway Points
• Learn about the Information security risks
affecting your business
• Address, Transfer or Accept them
• Don’t just ignore them
• Learn about the security and privacy related
regulations affecting your business
• Understand consequences of non-compliance
• Build security into your day-to-day operations
• Don’t just layer it on
• Don’t make it “extra work”
SMB Cyber Security Alliance
www.smbcybersecurity.org
SMB Cyber Security Alliance
www.smbcybersecurity.org
SMBCSA Online Helpdesk
SMB Cyber Security Alliance
www.smbcybersecurity.org
Contact Information
Jerrod Barton
Director, Community Outreach
SMB Cyber Security Alliance
Tel: (540) 308-9609
Email: jerrod@smbcybersecurity.org
SMB Cyber Security Alliance

Mais conteúdo relacionado

Mais procurados

Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016Tomppa Järvinen
 
What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity Blockchain Council
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
Informatics practices (1)
Informatics practices (1)Informatics practices (1)
Informatics practices (1)abdul talha
 
Cyberlaw - Defining and Categorizing Chaos
Cyberlaw - Defining and Categorizing ChaosCyberlaw - Defining and Categorizing Chaos
Cyberlaw - Defining and Categorizing ChaosDavid Myers
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksSurfWatch Labs
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 

Mais procurados (20)

Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity What is the future of blockchain in cybersecurity
What is the future of blockchain in cybersecurity
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Informatics practices (1)
Informatics practices (1)Informatics practices (1)
Informatics practices (1)
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Cyberlaw - Defining and Categorizing Chaos
Cyberlaw - Defining and Categorizing ChaosCyberlaw - Defining and Categorizing Chaos
Cyberlaw - Defining and Categorizing Chaos
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
S719a
S719aS719a
S719a
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
What Is "Secure"?
What Is "Secure"?What Is "Secure"?
What Is "Secure"?
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 

Destaque

2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
Motor insurance: services telematics based
Motor insurance: services telematics basedMotor insurance: services telematics based
Motor insurance: services telematics basedMatteo Carbone
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 

Destaque (6)

2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
Python Final
Python FinalPython Final
Python Final
 
Motor insurance: services telematics based
Motor insurance: services telematics basedMotor insurance: services telematics based
Motor insurance: services telematics based
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 

Semelhante a Protecting Customer Confidential Information

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Precisely
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...Ulf Mattsson
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Nick Powers
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection featuresMariaDB plc
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
Modern Web Security
Modern Web SecurityModern Web Security
Modern Web SecurityBill Condo
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramBGA Cyber Security
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?BCS ProSoft
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 

Semelhante a Protecting Customer Confidential Information (20)

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
ICT Security is Everyone's Business
ICT Security is Everyone's BusinessICT Security is Everyone's Business
ICT Security is Everyone's Business
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
Modern Web Security
Modern Web SecurityModern Web Security
Modern Web Security
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 

Mais de William McBorrough

MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceWilliam McBorrough
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramWilliam McBorrough
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement William McBorrough
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberWilliam McBorrough
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramWilliam McBorrough
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalWilliam McBorrough
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
MCGlobalTech Capability Statement
MCGlobalTech Capability StatementMCGlobalTech Capability Statement
MCGlobalTech Capability StatementWilliam McBorrough
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in ManufacturingWilliam McBorrough
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 

Mais de William McBorrough (20)

MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance Service
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance Program
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management Program
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
MCG_OnePageBrochure_Final
MCG_OnePageBrochure_FinalMCG_OnePageBrochure_Final
MCG_OnePageBrochure_Final
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
MCGlobalTech Capability Statement
MCGlobalTech Capability StatementMCGlobalTech Capability Statement
MCGlobalTech Capability Statement
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Protecting Customer Confidential Information

Notas do Editor

  1. Background Goals of IT Security Today’s reality Sizing up the problem for an organization The fix – In short, prevent access and/or make it unreadable if accessed Human aspects Procedures NDAs Policy – what do we allow on laptops? Training Social engineering Local Physical Storage media hard drive encryption Vista Bit Locker Seagate Computrace USB drives 2 factor authentication Application security (Adobe Acrobat, MS Word, Win Zip) security vs. password hacking programs – easy break in! Remote VPNs RDP Web certificates Sharing E-mail – hosted encryption Zix Corp e-mail for Outlook Secure transmission programs Portals Disposing Semshred - http://www.semshred.com/
  2. Obsolete Agenda / other ideas: Background What’s confidential? Where is it stored? Restricting access Physical Authentication Encryption Secure sharing
  3. AES Encrypted Portable Storage! The KanguruMicro Drive AES is the only USB Flash Drive that meets federal requirements for insuring the confidentiality of sensitive data and information accessed by portable flash drives!This high speed, high quality USB2.0 Flash Drive has undergone rigorous testing and is FIPS 140-2 Certified (FIPS Certification # 682). It is the first USB2.0 Flash Drive with software based encryption to be FIPS Certified for Government use! The KanguruMicro Drive is ultra secure, utilizing 256-bit AES Encryption to protect data stored on the drive. Plug the KanguruMicro Drive AES into any available USB or USB 2.0 port and begin using it! Store and transport your work files in a safe, secure fashion Start from $49 – 1GB drive ~ $110
  4. WAP = Wireless Access Point WEP = Wired Equivalent Privacy WPA = Wi-Fi Protected Access
  5. Why is ShareFile the best way to transfer files securely? Create online folders to simplify collaboration and communication Completely custom branded with your company logo and colors A login box can be placed on your company web site Unlimited user accounts for clients and partners Ability to send large files via e-mail with a hyperlink Proven easy-to-use interface for file and user management Tracking and alerts to confirm that clients have received files Unlimited data storage backed up daily 128-bit encryption to secure your data against hackers Great telephone and e-mail support Easy to set up...signing up only takes about 5 minutes Automatic compression of downloaded files Ability to request files from clients with an e-mail hyperlink Upload multiple files at once No software to install or complicated Java Applets Easy user management Enterprise Account $99.95 per month or $119.95 per month with monthly billing 10 GB montly bandwidth 30 employee accounts Unlimited client/users accounts Unlimited disk space Custom branding to match your company web site Telephone and e-mail support Daily backup
  6. The ChallengeWith increasing compliance regulations and concerns about protecting information privacy, it is becoming critically important to exchange information, data, and file/documents via secure methods. However, it remains common practice today of many companies to send confidential or sensitive information across mediums that are insecure – namely email and FTP – technologies that were not built to address security or robust reporting requirements. Solving the Secure File Delivery ChallengePipeline eXchange™ is an electronic file exchange service that enables you to securely send and receive documents/files of any type or size with your trading partners. Pipeline eXchange™ is 100% browser based and easy to use. Users simply specify the files they wish to be delivered, and then select the recipients and delivery options. The files are securely delivered to each recipient and Pipeline eXchange™ automatically tracks and generates an audit trail for the entire delivery process sending various status notifications to the sender. Easy to Use    Requires only a browser    No software to install    No hardware to manage    Minimal user support required        Secure    Layered encryption and access control    SAS 70 certified data center    User access audit log        Enterprise Features    User and Groups administration    ERP, CRM, SCM connectors    Full service customization        Reliable    99.9% uptime guarantee    24x365 monitoring    World-class infrastructure        Affordable    Monthly subscription    Usage-based billing options    Get started for $79 per month