Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
1.0 introduction v2
1. Introduction to the PMG Small Business Security Blueprint Presented By Roger Smith Operations Manager
2. Topics that we are going to cover in this presentation The PMG Small Business Security Framework What it is. What are the more important components. Importance of Data protection for your business. Where this framework applies – internal and external access.
3. If done correctly, like the iceberg, 90% of business security is not visible to the business or the users.
4. Importance of Data security for your business A framework give information security a structure Not only protects your business but allows your business to react properly in the case of a breach. You know who and when users have access to your information
5. Resent Headlines for security breaches On May 28, 2009, Aetna Insurance contacted 65,000 users to let them know that their personal data may have been compromised On May 1, 2009, LexisNexis disclosed a data breach to 32,000 customers. Although the data theft took place between June 2004 and October 2007 In 2008, credit card processor Heartland Payment Systems was breached. The exact number of financial records stolen remains a mystery, but on August 17, 2009 Albert Gonzales was indicted for stealing more than 130 million credit and debit records.
6. Small Business needs a framework to protect and secure their business data Definition of a small business is based on size – 3 – 25 Users is classed as a small business. The available systems and frameworks do not work for small business. They are aimed at Larger Enterprises and Government Departments For small business access to data is priority Business Continuity and Resilience to change are some of the concerns of a small business
7. The Small Business Security Framework Protect the business with a firewall Firewall Add secure wireless for ease of access and functionality Wireless access VPN Add VPN for Road warriors and home users SPAM, Content Filtering, Web Protection Protect internal users with Anti Spam, Content Filtering for malware and Spyware, anti Virus and restrict access if required Intrusion Detection Report and track all unauthorised access Best Practice Create and follow best practices for the business Process and procedures Set up processes and procedures for the staff Configure auditing and monitoring of the data Auditing / Monitoring Start with the data in a saved location Data Baseline Business Continuity Disaster Recovery Business Resilience Patch Management Compliance Follow compliance and regulatory requirements for the business Initialise patch management and protect users with AV solutions Create Disaster Recovery and Business continuity Plans for the data Build business resilience around the data and the business
8.
9. Internal and external systems. You still need access to the information You still need to protect that information wherever it is stored You need to protect your information in transit You need to protect your users You have a duty of care for your clients
10. Conclusion The PMG small Business Security Framework gives small business a start for the management of their security of their business information It doesn’t matter where your data is stored you still need to Protect it Access it Track the access of it Secure it in transit The SBSF allows business to make common sense decisions based on facts not knee jerk reactions.
Editor's Notes
First of 7 presentations and webinars that are available for small business environmentsName rank and serial numberBrief note about PMG and what we do. MSP, member of the MSP alliance for ethical computer and network support.
The introduction is aimed at small businesses from 3 – 25 users What we will be looking at today are SBSF and what it consists of. Why it is important to protect your business information and finallyWhere the framework applies local or cloud based
Compromised data have a regular appearance in the news on the internet. Most companies play down the effects of compromised data, hacking, stupidity or malicious internal problems.These are not the same level as a small business but a small business – insurance broker for instance could have 5000 - 10000 clients and all that client information is focused in one place, either internal to your business or in the cloud.
Small business has different priorities (there are information security frameworks for Government departments but for a small business they really are overkill) So lets put a little sanity into the conversation.Access is the most importantBusiness continuity and resilience to change are the driving force of the business
Starting with a baseline of data – doesn’t matter if it is on site or off site. We want to now protect that dataFor a small business – resilience is what they are trying to achieve. To be able to react to both good and bad influences with the correct response is importantTo gain the business resilience then a good BC and DR plan is neededFrom the outside the protection of the users and the data is a main concernSmall business rely on wireless to be more agileVPN allow connection from outside users and conversations are encryptedSecond level of protection comes from content filtering – Spam from the internet, users accessing websites and initial Virus, work, mal and spyware protectionPart of the auditing and monitoring components IDS allows alerts on attacks on the firewallBest practice – the implementations of specific systems to get the most from the technology of the business. Utilisation depends on a number of factorsThe larger a business gets the more processes and procedures are required to support the business. They can streamline the business and increase securityAuditing and monitoring allows for granular control over data and systems – who is allowed to se what and what happens if someone who is not allowed access tries.All businesses have a compliance component – Tax is a compliance issue. Some business have other systems that they have to adhere to.And finally Patch management and Virus protection keeps the data safe where it is stored.
Locally All protection is based inside the office including all access to data and disaster recovery maybe off siteHostedCertain components of your business are off site not just your website (web city, Melbourne IT) I.E. hosted exchange solutions. You still have a number of systems still located internally or you are going Cloud basedAll your business information is off site
Thank you for taking the time to listen or view this presentation. It is the first of 8 webinars / presentations for small business so that they can define their business security requirementsThe complete set of 4 x CD’s, MP3 player with audio, transcripts of the presentations and policies and procedures based on small business requirements are all available from our web site.You can purchase them in Hard copy or you can down load them from the web site.