Protecting Your Business - All Covered Security Services

Post on 28-Nov-2014

53 views 0 download

Tags:

description

All Covered is a nationwide provider of IT services and security. This presentation highlights the most essential factors that businesses need to be aware of when implementing their security plan. It shows how any company, regardless of size, is at risk with external, and internal, security threats. Whether you own a small, medium, or large business, IT security should be at the forefront of any discussion. It is better to be proactive and prevent an attack from happening than having to pick up the pieces after the damage has already been done to your business.

transcript

ALL COVERED

SECURITY SERVICES

2

About All Covered

All Covered – IT services from Konica Minolta

Established in 1997

Headquartered in Foster City, California

Offices in over 25 cities in the United States

Over 800 employees with approximately 600 engineers with industry certifications

3

Protecting Your Business

IT Security Challenges:

Malware/Spyware Data Loss / Disasters

Not Having a Plan

4

Is Your Business at Risk?

Without internal security and data recovery precautions, businesses put revenue, reputation, compliance, and innovation at huge risk…

5

Don’t Be a Target!

The Target data breach affected 40 million debit and credit cards and 70 million customer records

The Target breach incident went unnoticed

for almost a month!!

6

Security & Your Business

You don’t need to be a company the size of Target to be impacted by a security breach…

“In 2014, 40% of small and mid-size businesses that manage their own security will have their network accessed by a hacker, and more than 50% won’t even know they were attacked”.

7

Common Security Challenges

Going at it alone can be very demanding….

IT Responsibilities:

• Messaging Protection• Website security• Web Content Filtering• Virus Definitions• Patching• Backup and recovery• BYOD policy

• Compliance management

8

Why Businesses Might Need - Assistance

• Installing firewalls and antivirus on your PCs is not enough…cyber attacks can still get through and go unnoticed.

• Security responsibilities often fall to IT generalists who are also tasked with managing servers and other applications

• Many organizations lack the SKILLS, TIME, RESOUCES, and EXPERTISE to properly deploy and maintain the technological side of IT security

What if your Business was Attacked?

• Do you have a way to detect cyber-attacks?

• Do you know what to do if your data was hacked or stolen?

• What would you do if a virus spread to every one of your servers and PCs?

Recent Attacks

9

10

Types of Security Threats

• Malware • Spyware• Adware• Phishing• Data Theft

• Ransomware• Viruses• Password hacking• Vulnerability Scanners• Packet Sniffers

And don’t forget about: Insider Activity

Criminals use a number of tactics to gain access to your data. Among the most common tactics are:

11

Success Stories - SecurityDisaster Recovery

– Problem: • Ransomeware introduced to IT environment via phishing email• Accounting and Financial systems were encrypted• Client had not confirmed backup for weeks• Data stored on Accounting laptop was not part of backup• Client had to pay a ransom to decrypt files• 4 Days to resolve

– Billing, Timesheets, Payroll, Email all impacted

– Solution: • Deployed All Covered backup for servers• Deployed All Covered backup for workstations• Deployed All Covered Email Protection Services

– Benefit:• Automated server backups with offsite copy• Server backups managed and monitored from the All Covered

NOC (Network Operations Center) • Data on laptops is now backed up to the cloud• Email is now protected with antispam, antivirus and phishing

protection.

Software Company

Location: Chicago, IL

Established: 1992

Description:

Over 700 employees and 3 offices in the Chicago Area

12

Success Stories - SecurityRecurring Virus and Malware Infections

– Problem: • Multiple virus and malware infections introduced via phishing

emails and malicious links• Various servers and workstations infected and re- infected

over several months• Several hours to resolve each time

– Email, File storage, business applications where impacted over the various infections

– Solution: • Setup Email Spam Filtering and Antivirus• Deployed Malware prevention• Setup DNS filtering

– Benefit: • Reduced the reoccurrence of virus and malware infections. • Improved employee confidence in IT systems. • Improved employee productivity.

Accounting Firm

Location: Atlanta

Established: 1998

Description:

Over 150 employees and 4 offices in the Atlanta area

13

Success Stories - SecurityVulnerability Scanning

– Problem: • Required to have periodic vulnerability scans to meet HIPAA

compliance• Client was looking for a managed solution as they did not

have internal expertise to deploy and manage an on-premise solution

• Out of compliance without this solution

– Solution: • Deployed Managed Vulnerability Scan Service

– Benefit:• Provides automated monthly vulnerability scans and reports

Healthcare Provider

Location: San Jose, CA

Established: 1989

Description:

Small provider with 2 offices and 20 employees

All Covered Security Services

Messaging Protection Email Antivirus Spam Filtering Email Continuity Email Encryption Phishing Protection

Endpoint Protection Managed Antivirus Managed Malware Protection DNS Filtering Web Content Filtering

Patching Managed Microsoft Patching

Vulnerability Management Managed Vulnerability Scan Service

All Covered will secure client environments using the following ACC services:

14

15

Additional Threats to Consider

Unfortunately, threats to your business are not only security breaches and cyber attacks; your business can also fall victim to…DATA LOSS.

16

What if You Lost Your Data?

Do you have a data backup system in place?

If your entire building burned down or all of your servers crashed, would your business be able to recover?

17

Types of Data Loss Threats

• Fires• Floods• Earthquakes• Hurricanes• Tornadoes

• Data Corruption• Hardware/System Malfunction• Software corruption• Human error• Brownouts• Theft

18

Data Loss Statistics

Every week, 140,000 hard drives crash in the United States and 31% of PC users have lost all of their files due to events beyond their control.

19

Success Stories – Data BackupDisaster Recovery

– Problem: • Fire in an adjacent building

– Solution: • All Covered Backup for Servers

– Business Continuity in the Cloud

– Benefit:• Servers damaged by water and

smoke replaced by virtual cloud servers in under 2 hours

• Access to building was lost, but full access to systems and data in the cloud was uncompromised

Location: Des Moines, Iowa

Established:1888

Description: • Community development

organization servicing central Iowa

• 21 affiliate chambers of commerce

• 5,000 business members

Community Development Company

Data Backup and Recovery Services

Managed Backup and Recovery Physical Servers Virtual Servers PCs and Laptops

Email Protection Archiving

Cloud Services Cloud Assessments Cloud Hosting

All Covered will provide protection of client data via the following ACC services:

20

21

Additional Security Measures: Cloud Services

Benefits and features:• 24x7 Availability & Reliability

• Remote access from any location

• Predictable monthly costs

• Ability to quickly scale up or down

Looking for an extra layer of security? Consider the Cloud!

All Covered Cloud Services include:

• Fully managed virtual servers located in the U.S.

• Cloud Backup and Disaster Recovery

• Cloud Hosted Exchange

• Cloud Business Continuity

Success Stories - CloudRisk Mitigation & Regulatory Compliance

22

– Problem: • Locations with aging infrastructure, intermittent Internet

and unreliable power caused major outage. All 6 branches lost access to the network and internet for several days.

– Solution: • All Covered Cloud Servers and co-location

– Benefit:• Eliminated need to purchase new servers for

secondary locations

• Reliable power to all centrally located servers while removing need to purchase backup power

• Achieved compliance conditions

Location: Troy, Michigan

Established: 1911

Description:

Community bank with 6 branches. Dedicated to meeting the financial needs of local residents and businesses.

Community Bank

23

What Are the Steps You Can Take?

• There is a saying in the medical profession, “Prevention is the Best Medicine.” The same can be said for information security.

• Businesses can overcome internal and external threats by seeking professional services from outside security experts:

A third-party security assessment gives organizations a holistic look at their technology, policies, and practices around information security.

24

All Covered Can Help

• Step 1: Plan: Build a comprehensive security plan that includes BYOD, malware and virus protection, and data security.

• Step 2: Secure: Put the right safeguards into action including - hosted AV, vulnerability management, endpoint protection, network monitoring, and patching.

• Step 3: Protect: Implement ongoing managed protection of data, PCs, and servers (both on-site and in the cloud) for quick and reliable recovery

25

Managed Vulnerability Scanning

Vulnerability Scanning Service

Scanning of all internal/external IPs Performed Monthly Obtain license assigned by All Covered Submit ACC contract for total number of IPs

to scan

Vulnerability Report Includes:

Executive summary Discovered Hosts Discovered Hosts with vulnerabilities Vulnerability details Recommended solution(s)

26

Steps You Can Take Now

Data Backup and Recovery

• Identify data that needs to be backed up• Move those files to your server• Decide on storage method:

disk vs. tape, or both• Get data offsite

Users and Networks

• Protect your data from your employees• Protect your employees from themselves• Educate employees on threats• Communicate policies and procedures• Remove password sticky notes from all monitors

27

Steps You Can Take Now

Security Management

• Centralize Management• Institute monitoring and reporting• Enforce policy across all layers• Consider Outsourcing

Data Access

• Understand where your network begins and ends• Secure the entire perimeter of your network• Define and enforce policies• Inspect and filter all traffic in and out of your network

28

Appendix

“40% of small to medium businesses who manage their own network and use the Internet for more than e-mail will have their network accessed by a hacker and more than 50% won’t even know they were attacked” (Source: Gartner Group)

“Every week, 140,000 hard drives crash in the United States and 31% of PC users have lost all of their files due to events beyond their control” (Source: Mozy Online Backup)

For more information please visit:

http://www.allcovered.com/ or http://www.allcovered.com/learning/

Social presence:

Twitter: @allcovered

Facebook: https://www.facebook.com/allcovered

LinkedIn: http://www.linkedin.com/company/all-covered

Google+: https://plus.google.com/+Allcovered-IT-service/about