advanced security w/ joshua peskay by idealware & lsntap.org
TRANSCRIPT
Advanced Security:Protecting Yourself in the Real World
What We’ll Cover Today
Introductions
Everyone Should Be Concerned?
Knowledge is Power
Taking Inventory
Know What You Have to Protect
Where is it?
How Old is it?
Who is Responsible for it?
Who You Gonna Call?
Should You Hire Help?
How do Security Breaches Happen?
(in the real world)
What Could Happen?
Malware and Viruses
Anti-Virus Software
Password Strength and Security
Password Management
Private Passwords
Accidents Happen
Backup Solutions
Put Everything In Its Place
Keep Your Data Where It Is
Keep it Even Safer
Website Security
Keep Internal Information Safe
Keep Yourself Safe Online
How Can You Protect Yourself?(in the real world)
The Only Way to Truly Protect Yourself
Convenience vs. Security
For Example…
Multi-Factor Authentication
Who Supports It?
For Example…
For Example…
Instead
Think About Your Data
What Data is Important to Have?
Worst Case Scenario
Is Everything Secure?
What is Easy to Protect Against?
Firewalls
Firewalls
What Could be Fixed with a Policy Change?
What is Enough for You?
Culture, People, and Policy
Technology Can Only Do So Much
The Cloud isn’t Always Safe
It Doesn’t Have to Be Expensive
Consult with Your Staff
Security Audit
Have Recurring Trainings
New Employees
Exiting Employees
Know the Legal Requirements
Consider Getting Outside Help…
Questions?