SlideShare a Scribd company logo
1 of 19
Download to read offline
Joey Howland
Chief Information Security Officer
The Changing Workplace Environment:
Cybersecurity for a Remote Workforce
Why This Matters
Financial
Impact
Customer
Confidence
Employee
Protection
$6 trillion in cyber-
crime costs by 2021
3 billion PII records
stolen last year
Payroll cyber attacks
hit employee wallets
Herjavec Group
• Outside organization’s security boundary
• Often working on shared computers
• Increase in attempts by malicious actors during crisis
Why Home is Different
• National Institute of Standards and Technology
https://www.nist.gov/cyberframework
The NIST Cybersecurity Framework
What you should consider as an organization?
How are your employees working? Where are they
accessing organizational data or applications?
• Organization's network (file servers, local
applications)
• Cloud solutions (Office 365 / G-Suite, CRM, Finance
apps, etc.)
Identify Areas of Access
What controls are in place to ensure only your employees
can get to your systems?
• Virtual Private Networks (VPN)
• Secure Remote Access Solutions
• Citrix
• Splashtop
MS Remote Desktop Protocol (RDP) is not secure
• Good remote access solution but be behind another
security boundary
How do employees gain access?
Watch all entry points
• Intrusion Detection Systems (IDS)
• Log File Retention – Analyze them!
• Don’t forget Cloud based systems
• Security Information and Event Management (SIEM)
• Capture and analyze all data
• 3rd party monitored
Monitor Points of Entry
Setup MFA on all access points to organizational data or
systems. Don’t rely on simple ID / password combinations.
• Security questions are not MFA
• E-mail should be the last MFA option
• SMS (Text messages) / Phone calls – Good
• Mobile Application or Key fobs – Excellent!
Enable Multifactor Authentication
Are you allowing connections from unsafe devices?
• Consider only allowing connection from organization
owned devices
• Provide protective software – Endpoint protection
• Access control systems – basic checks before allowing a
connection
Secure Remote Endpoints
Consider how data may be moved in and out of your
environment
• How can I ensure data on employee owned devices is
backed up?
• Do I need to put limits on confidential data so it cannot
be moved outside my organization?
• How can I ensure data moving into my systems is safe?
Protect Your Data
Phishing Attacks
Personal emails often don’t have the same level of protection as enterprise
email solutions.
Unfamiliar Websites
Reports show cyber attackers taking advantage of the COVID-19
situation to spread malware. You should never need to download
something in order to view an online map.
Train your employees!
What can your employees do?
Update your computer’s operating system
• Check the version of Windows you have
• Windows 7 is now end-of-life, which means no more security patches!
• Install the latest patches
Update your web browser
• Go to the vendor’s website and find out how
Install or update antivirus software
• Good options include Webroot, BitDefender, Norton, McAfee
• Make certain virus signatures are up to date!
Secure Their Computers
Secure WiFi routers or firewalls
• Update the device firmware
• Change default admin password
• Disable remote management
• Instructions on vendor's website
Update Internet-connected devices
• Google Nest, security system, toaster, etc.
Secure Their Networks
Copy local documents back into your organization’s
environment.
Common tools include (Organization controlled):
• OneDrive / SharePoint
• Google Drive
• Citrix ShareFile
• Box
• DropBox
• VPN
Backup Your Data
If you see a suspicious email, link, or website, share it
through the proper channels.
Communicate Suspicious Activity
1. Secure The Computer
2. Secure The Network
3. Provide quality remote access solutions
4. Enable Multifactor Authentication
5. Backup The Data
6. Communicate Suspicious Activity
7. Be Click Cautious
Review
Click cautious > click curious
Thank you and stay safe!
Learn more at VC3.com
joe.howland@vc3.com

More Related Content

What's hot

Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Dalia Reda
 

What's hot (20)

Summer Tour CCH Event L2TC
Summer Tour CCH Event L2TCSummer Tour CCH Event L2TC
Summer Tour CCH Event L2TC
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enough
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 

Similar to Cybersecurity

Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 

Similar to Cybersecurity (20)

Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Cloud security
Cloud securityCloud security
Cloud security
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 

More from nado-web

More from nado-web (20)

Federal Legislative Update
Federal Legislative UpdateFederal Legislative Update
Federal Legislative Update
 
Plenary - Stars of the Southwest: Lifting Regional Economies
 Plenary - Stars of the Southwest: Lifting Regional Economies Plenary - Stars of the Southwest: Lifting Regional Economies
Plenary - Stars of the Southwest: Lifting Regional Economies
 
Outdoor Rec in Southwest New Mexico
Outdoor Rec in Southwest New MexicoOutdoor Rec in Southwest New Mexico
Outdoor Rec in Southwest New Mexico
 
Affordable and Accessible Housing: Imperative for Strong Economies
Affordable and Accessible Housing: Imperative for Strong Economies      Affordable and Accessible Housing: Imperative for Strong Economies
Affordable and Accessible Housing: Imperative for Strong Economies
 
Creative Collaborations: Tribal Nations
Creative Collaborations: Tribal NationsCreative Collaborations: Tribal Nations
Creative Collaborations: Tribal Nations
 
Regional Resilience Partnership
Regional Resilience PartnershipRegional Resilience Partnership
Regional Resilience Partnership
 
Louisiana's Digital Equity Plan
Louisiana's Digital Equity PlanLouisiana's Digital Equity Plan
Louisiana's Digital Equity Plan
 
Broadband- Ruffin
Broadband- RuffinBroadband- Ruffin
Broadband- Ruffin
 
West Texas Aerospace and Defense Manufacturing Coalition
West Texas Aerospace and Defense Manufacturing CoalitionWest Texas Aerospace and Defense Manufacturing Coalition
West Texas Aerospace and Defense Manufacturing Coalition
 
H2theFuture
H2theFutureH2theFuture
H2theFuture
 
Tulsa Regional Advanced Mobility (TRAM) Corridor
Tulsa Regional Advanced Mobility (TRAM) CorridorTulsa Regional Advanced Mobility (TRAM) Corridor
Tulsa Regional Advanced Mobility (TRAM) Corridor
 
Oklahoma Biotech Innovation Center
Oklahoma Biotech Innovation CenterOklahoma Biotech Innovation Center
Oklahoma Biotech Innovation Center
 
Northern New Mexico Workforce Integration Network (WIN)
Northern New Mexico Workforce Integration Network (WIN)Northern New Mexico Workforce Integration Network (WIN)
Northern New Mexico Workforce Integration Network (WIN)
 
Brownfields Presentation
Brownfields PresentationBrownfields Presentation
Brownfields Presentation
 
Kansas State University UC Showcase
Kansas State University UC ShowcaseKansas State University UC Showcase
Kansas State University UC Showcase
 
KCSL UMKCIC University Center
KCSL UMKCIC University CenterKCSL UMKCIC University Center
KCSL UMKCIC University Center
 
University of Montana Rural Innovation Initiative
University of Montana Rural Innovation InitiativeUniversity of Montana Rural Innovation Initiative
University of Montana Rural Innovation Initiative
 
University of Kansas University Center
University of Kansas University Center University of Kansas University Center
University of Kansas University Center
 
University of North Dakota Center for Innovation
University of North Dakota Center for InnovationUniversity of North Dakota Center for Innovation
University of North Dakota Center for Innovation
 
Iowa State University CIRAS
Iowa State University CIRASIowa State University CIRAS
Iowa State University CIRAS
 

Recently uploaded

Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
MadhuKothuru
 

Recently uploaded (20)

Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
 
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
 
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx
 
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptx
 
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
 
tOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTRtOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTR
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
 
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final Presentation
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
 

Cybersecurity

  • 1. Joey Howland Chief Information Security Officer The Changing Workplace Environment: Cybersecurity for a Remote Workforce
  • 2. Why This Matters Financial Impact Customer Confidence Employee Protection $6 trillion in cyber- crime costs by 2021 3 billion PII records stolen last year Payroll cyber attacks hit employee wallets Herjavec Group
  • 3. • Outside organization’s security boundary • Often working on shared computers • Increase in attempts by malicious actors during crisis Why Home is Different
  • 4. • National Institute of Standards and Technology https://www.nist.gov/cyberframework The NIST Cybersecurity Framework
  • 5. What you should consider as an organization?
  • 6. How are your employees working? Where are they accessing organizational data or applications? • Organization's network (file servers, local applications) • Cloud solutions (Office 365 / G-Suite, CRM, Finance apps, etc.) Identify Areas of Access
  • 7. What controls are in place to ensure only your employees can get to your systems? • Virtual Private Networks (VPN) • Secure Remote Access Solutions • Citrix • Splashtop MS Remote Desktop Protocol (RDP) is not secure • Good remote access solution but be behind another security boundary How do employees gain access?
  • 8. Watch all entry points • Intrusion Detection Systems (IDS) • Log File Retention – Analyze them! • Don’t forget Cloud based systems • Security Information and Event Management (SIEM) • Capture and analyze all data • 3rd party monitored Monitor Points of Entry
  • 9. Setup MFA on all access points to organizational data or systems. Don’t rely on simple ID / password combinations. • Security questions are not MFA • E-mail should be the last MFA option • SMS (Text messages) / Phone calls – Good • Mobile Application or Key fobs – Excellent! Enable Multifactor Authentication
  • 10. Are you allowing connections from unsafe devices? • Consider only allowing connection from organization owned devices • Provide protective software – Endpoint protection • Access control systems – basic checks before allowing a connection Secure Remote Endpoints
  • 11. Consider how data may be moved in and out of your environment • How can I ensure data on employee owned devices is backed up? • Do I need to put limits on confidential data so it cannot be moved outside my organization? • How can I ensure data moving into my systems is safe? Protect Your Data
  • 12. Phishing Attacks Personal emails often don’t have the same level of protection as enterprise email solutions. Unfamiliar Websites Reports show cyber attackers taking advantage of the COVID-19 situation to spread malware. You should never need to download something in order to view an online map. Train your employees!
  • 13. What can your employees do?
  • 14. Update your computer’s operating system • Check the version of Windows you have • Windows 7 is now end-of-life, which means no more security patches! • Install the latest patches Update your web browser • Go to the vendor’s website and find out how Install or update antivirus software • Good options include Webroot, BitDefender, Norton, McAfee • Make certain virus signatures are up to date! Secure Their Computers
  • 15. Secure WiFi routers or firewalls • Update the device firmware • Change default admin password • Disable remote management • Instructions on vendor's website Update Internet-connected devices • Google Nest, security system, toaster, etc. Secure Their Networks
  • 16. Copy local documents back into your organization’s environment. Common tools include (Organization controlled): • OneDrive / SharePoint • Google Drive • Citrix ShareFile • Box • DropBox • VPN Backup Your Data
  • 17. If you see a suspicious email, link, or website, share it through the proper channels. Communicate Suspicious Activity
  • 18. 1. Secure The Computer 2. Secure The Network 3. Provide quality remote access solutions 4. Enable Multifactor Authentication 5. Backup The Data 6. Communicate Suspicious Activity 7. Be Click Cautious Review
  • 19. Click cautious > click curious Thank you and stay safe! Learn more at VC3.com joe.howland@vc3.com