SlideShare a Scribd company logo
1 of 13
Small Business Security
Adam Walter
Your Title, Company
The Problem
•Networks are big!
The Problem
•Networks are big!
•Networks are complex!
•So are our egos!
Things you already know.
Resources
• No Time
• No Money
• Did I mention no time
or money?
Users
• Ignorance
• Human Nature
• Indifference
Somewhat interesting Stats.
Verizon Report Highlights
• 4% of breaches.
• 87% had evidence.
• 94% = financial services
“Thieves are more likely to select targets
based on the perceived value of the
data and cost of attack than victim
characteristics such as size” -Verizon
Somewhat interesting Stats.
Verizon Report Highlights
• 4% of breaches.
• 87% had evidence.
• 94% = financial services
• NO CORRELATION BETWEEN ORG SIZE AND CHANCE OF
DATA BREACH!
What can we do?
Simplicity
• 4%
• Vigilance
• Consistency
Resources
• Managed Services
• Affordable Utilities
• Users?
Topic of Slide
Sub-topic 1
• Point a.
• Point b.
• Point c.
Sup-topic 2
• Point a.
• Point b.
• Point c.
Questions?

More Related Content

Viewers also liked

Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...exponential-inc
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Spiceworks
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security programmatt_presson
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesFundera
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Challenges Of Global Data Collection
Challenges Of Global Data Collection   Challenges Of Global Data Collection
Challenges Of Global Data Collection ResearchShare
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!cisoplatform
 
Small business data security
Small business data securitySmall business data security
Small business data securityDavid Usher
 

Viewers also liked (13)

Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
 
Box.net overview
Box.net overviewBox.net overview
Box.net overview
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security program
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small Businesses
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Challenges Of Global Data Collection
Challenges Of Global Data Collection   Challenges Of Global Data Collection
Challenges Of Global Data Collection
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
Small business data security
Small business data securitySmall business data security
Small business data security
 

Similar to Small Business Network Security Solutions

Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Shawn Tuma
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Ted - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed Sanders
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersSarah K Miller
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Stephen Cobb
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Hacking hired [Forecasting 2021] Jan 2021
Hacking hired [Forecasting 2021] Jan 2021Hacking hired [Forecasting 2021] Jan 2021
Hacking hired [Forecasting 2021] Jan 2021Rachel Harpley
 
How to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsHow to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsSecurity Innovation
 
Mork - CISO Summit USA 2016 - Security in an Outsourced World
Mork - CISO Summit USA 2016 - Security in an Outsourced WorldMork - CISO Summit USA 2016 - Security in an Outsourced World
Mork - CISO Summit USA 2016 - Security in an Outsourced WorldNothing Nowhere
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 

Similar to Small Business Network Security Solutions (20)

Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Ted - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed - CyberSecurity for your Business
Ted - CyberSecurity for your Business
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Adequate securitynew1404.019
Adequate securitynew1404.019Adequate securitynew1404.019
Adequate securitynew1404.019
 
Hacking hired [Forecasting 2021] Jan 2021
Hacking hired [Forecasting 2021] Jan 2021Hacking hired [Forecasting 2021] Jan 2021
Hacking hired [Forecasting 2021] Jan 2021
 
How to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsHow to Get the Most Out of Security Tools
How to Get the Most Out of Security Tools
 
Mork - CISO Summit USA 2016 - Security in an Outsourced World
Mork - CISO Summit USA 2016 - Security in an Outsourced WorldMork - CISO Summit USA 2016 - Security in an Outsourced World
Mork - CISO Summit USA 2016 - Security in an Outsourced World
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 

More from Spiceworks

SpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceworks
 
Spice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpiceworks
 
Spice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpiceworks
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceworks
 
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...Spiceworks
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksSpiceworks
 
Introducing....Office 365
Introducing....Office 365Introducing....Office 365
Introducing....Office 365Spiceworks
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the CloudSpiceworks
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Spiceworks
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Spiceworks
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Spiceworks
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Spiceworks
 
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...Spiceworks
 
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Spiceworks
 
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Spiceworks
 
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...Spiceworks
 
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupUsing Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupSpiceworks
 
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...Spiceworks
 
Less IT and More SaaS & Cloud - Andy Schroepfer, Rackspace
Less IT and More SaaS & Cloud - Andy Schroepfer, RackspaceLess IT and More SaaS & Cloud - Andy Schroepfer, Rackspace
Less IT and More SaaS & Cloud - Andy Schroepfer, RackspaceSpiceworks
 
Cost-Effective Business Backup and Disaster Recovery - Brian Verenkoff, Buffalo
Cost-Effective Business Backup and Disaster Recovery - Brian Verenkoff, BuffaloCost-Effective Business Backup and Disaster Recovery - Brian Verenkoff, Buffalo
Cost-Effective Business Backup and Disaster Recovery - Brian Verenkoff, BuffaloSpiceworks
 

More from Spiceworks (20)

SpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation Eaton
 
Spice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpice world london 2012 Grey Howe
Spice world london 2012 Grey Howe
 
Spice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpice world london 2012 Ben Snape
Spice world london 2012 Ben Snape
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to Spiceworks
 
Introducing....Office 365
Introducing....Office 365Introducing....Office 365
Introducing....Office 365
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
 
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
 
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
 
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
 
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
 
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupUsing Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
 
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
 
Less IT and More SaaS & Cloud - Andy Schroepfer, Rackspace
Less IT and More SaaS & Cloud - Andy Schroepfer, RackspaceLess IT and More SaaS & Cloud - Andy Schroepfer, Rackspace
Less IT and More SaaS & Cloud - Andy Schroepfer, Rackspace
 
Cost-Effective Business Backup and Disaster Recovery - Brian Verenkoff, Buffalo
Cost-Effective Business Backup and Disaster Recovery - Brian Verenkoff, BuffaloCost-Effective Business Backup and Disaster Recovery - Brian Verenkoff, Buffalo
Cost-Effective Business Backup and Disaster Recovery - Brian Verenkoff, Buffalo
 

Small Business Network Security Solutions

Editor's Notes

  1. How big? ->Next Slide
  2. (1999) What is this ball of colors in the map below? It is the North American Internet, or more specifically a map of just about every router on the North American backbone, (there are 134,855 of them for those who are counting). The colors represent who each router is registered to. Red is Verizon, blue AT&T, yellow Qwest, green is other backbone players like Level 3 & Sprint Nextel, black is the entire cable industry put together, & gray is everyone else, from small telecommunications companies to large international players who only have a small presence in the U.S. This map demonstrates that although AT&T & Verizon own a lot of Internet pipes, they currently do not dominate the Internet infrastructure (yet). Next time your Internet connection goes down....the problem might not be right here in town....it could be six states away. And tracking down the problem, while we have the expertise to do so, does not mean we always have the power to fix it.
  3. 2003
  4. Sometimes it feels like putting a brushfire out with a bucket of water…and the bucket has a hole. Lets throw money at it! Lets put encryption in there somewhere!
  5. Just because you have spent a lot of money and time doesn’t mean you are secure.
  6. Small Business Security has its own issues. Bucket of water vs a brushfire. Poor budgets. No time. Overwhelming responsibilities. CEO’s Blackberry illustration.
  7. 2010 Data Breach Report From Verizon Business Only 4 percent of breaches assessed required difficult and expensive protective measures. Most breaches (60 percent) continue to be discovered by external parties and then only after a considerable amount of time. 11 percent were linked to business partners. 49 percent were caused by insiders. 48 percent of breaches were attributed to users who, for malicious purposes, abused their right to access corporate information 40 percent of breaches were the result of hacking, 28 percent were due to social tactics and 14 percent to physical attacks. 87 percent of victims had evidence of the breach in their log files, yet missed it. 94 percent of all compromised records in 2009 were attributable to financial services. The report finds no correlation between an organization’s size and its chances of suffering a data breach.
  8. 2010 Data Breach Report From Verizon Business Only 4 percent of breaches assessed required difficult and expensive protective measures. Most breaches (60 percent) continue to be discovered by external parties and then only after a considerable amount of time. 11 percent were linked to business partners. 49 percent were caused by insiders. 48 percent of breaches were attributed to users who, for malicious purposes, abused their right to access corporate information 40 percent of breaches were the result of hacking, 28 percent were due to social tactics and 14 percent to physical attacks. 87 percent of victims had evidence of the breach in their log files, yet missed it. 94 percent of all compromised records in 2009 were attributable to financial services. The report finds no correlation between an organization’s size and its chances of suffering a data breach.
  9. Back to the 4% stat, this is good news! Watch and be aware of your network, You know your network better than anyone, you know the holes that DO EXIST, that rash is not supposed to be there! Cant afford the time or an employee? Managed Services have become popular and are very affordable. Open source utilities can be fun and useful. Spiceworks, know what is on your network, check your events, backtrack, your own brain. Users can be taught and can become eyes and ears. Build up a reputation with them…