top tips for protecting your business online (updated) feb 14

Post on 29-Nov-2014

387 Views

Category:

Business

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

You know you should be using more online business services in ‘the Cloud’ but you’re worried about being cyber-scammed? This presentation provides you with the top tips of protecting your online business operations through a few simple and effective cyber-safety steps.

TRANSCRIPT

Top tips for protecting your business online

Allison Miller, Vanguard Visions Consulting

Modbury & Salisbury

You’ll find these slides at:

slideshare.net/vanguardvisions

Session Overview

• Why protect your business online?• Why is now a good time to be doing business

online?• Top tips for protecting your business online• Online cyber-smart business assessment• What will you investigate?• Workshop evaluation

Why protect your business online?

• More business is being done in ‘the Cloud’

• Privacy obligations• Maintain reputation / trust• Protect virtual assets (data)• Multiple users of the one device

Why protect your business online?

Image: IC3 and Computer Use and Safety - http://en.wikiversity.org/wiki/IC3/Computer_Use_and_Safety

What is the “Cloud”?

Image: http://en.wikipedia.org/wiki/Cloud_computing

Cloud Computing aka “the Cloud”

Types of Cloud Services

Image: 'What Type of Cloud?: Private, Public or+Hybrid?' - http://www.flickr.com/photos/26072489@N08/5332731617

Some Examples of Public Cloud Services

Some Examples of Private Cloud Services

Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031

A few ways of using the Cloud

1. Software as a Service (SAAS)– Email and Word processing– Accounting system– Human Resource/Project Management– Customer Service Management (CRM)

2. Platform as a service (PaaS) – Operating Systems – Web services– Development Platforms

3. Infrastructure as a service (IaaS)– Data storage– Processing power– Server virtualisation

Pros:• Anytime, anywhere, any device• Quickly ‘scale up’• Stronger security• External (backup) storage services• Reduced license costs• Outsource ICT services• Collaboration• Synchronisation• Greener computing

Why use the Cloud?

Image: ‘Open Sky’ by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8496879398

Why is now a good time to do business online?

Top five industries to fly in 2013-14 in Australia

Source: Ibis World (July 2013) –http://www.ibisworld.com.au/media/2013/07/10/52/

But what are some of the risks on doing more

business online?

Possible threats to your business

Tips from Queensland Government’s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud

• Hardware and software failure• Malware• Viruses• Spam, scams and phishing• Human error

General Threats

• Hackers• Fraud• Password theft• Denial of service• Security breaches• Staff dishonesty

Criminal Threats

• Fire• FloodsNatural

disasters

85% of all targeted

cyber intrusions can be prevented

Source: Strategies to Mitigate Targeted Cyber Intrusions - http://www.asd.gov.au/infosec/top35mitigationstrategies.htm

Australian Department of Defence, Intelligence and Security, Oct 2013

Top tips for protecting your business online

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business

Tip 1:

Install and update your

security software

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Hard Disk Drive - http://en.wikipedia.org/wiki/Hard_disk_drive ; Iomega external hard disk drive - http://commons.wikimedia.org/wiki/File:Iomega_external_hard_disk_drive_%28cut%29.JPG

Tip 2:

Have a data back-up strategy

1. Assess your level of risk and identify actions to minimise

2. What data needs to be backed up and how often

3. Select an appropriate back-up device/location

4. Set reminds to do your back-ups5. Test that you can use your

backed up data6. Store backed up data away from

its original source

Develop a back-up strategy

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: The computer revolution: Databases - http://en.wikibooks.org/wiki/The_Computer_Revolution/Databases/DBMS

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Master lock with root password - http://commons.wikimedia.org/wiki/File:Master_lock_with_root_password.jpg

Tip 3:

Assign someone to be responsible for

computer security

Importance of Passwords

Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low

Password length Time taken6 2 seconds7 3 minutes8 5.5 hours9 3 weeks

10 5.4 years11 515 years12 48 millennia20 324 billion billion years

Creating strong passwords

Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low

Your password Strengthening your password

Snow-storm 5n0w-5t0rm0214-Favourite 0214-Fav0ur1te

Red-leather-yellow-leather Red-le8ther-Yellow-le8ther

Allison-Miller 8ll1son-M1ller

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: purple Slog: “Information Security Wordle” http://www.flickr.com/photos/purpleslog/2870445268/

Tip 4:

Set clear policies about

computer/ network use

1. Acceptable use2. Handling sensitive data3. Securing and handling

equipment4. Using internet safely5. Remote access6. Web browser setting

Computer/Internet Security Policy

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: The computer revolution: Databases - http://en.wikibooks.org/wiki/The_Computer_Revolution/Databases/DBMS

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Tactical Technology Collective “Title Screen” - http://www.flickr.com/photos/ttc_press/5007644722/

Tip 5:

Develop a ‘culture of security’

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Frederick Hermann - Just like the Nest with a more connected world all the devices need software updates now. Your TV, DVD player, watch, thermostat etc didn't used to ask for constant software updates .. http://www.flickr.com/photos/netzkobold/9000028511/

Tip 6:

Use and update reputable software

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: jean pierre gallot - email-spam - http://www.flickr.com/photos/jean_pierre_gallot_69009/8456188320/

Tip 7:

Use email spam filters

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Virtual Private Network - http://en.wikipedia.org/wiki/Virtual_private_network

Tip 8:

Secure your remote access

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Imagine: e-commerce - http://commons.wikimedia.org/wiki/File:E-commerce.jpg

Tip 9:

Be vigilant about selling

online

1. Secure socket layer (SSL) technology

2. Encrypted financial transaction data

3. Update to latest (tested) version4. Routine back-ups

Create a secure online presence

Tips from Queensland Government’s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud Image: The computer revolution: Databases - http://en.wikibooks.org/wiki/The_Computer_Revolution/Databases/DBMS

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business

Tip 10:

Subscribe to cyber-security alert services

staysmartonline.gov.au/alert_service

Do the cyber-smart business assessment

staysmartonline.gov.au/business/home_based_businesses/questionnaire

1. Have good network security2. Protect your computer and

information3. Protect and use mobile devices

safely4. Transact securely online5. Back up and protect data.

Key points to remember

Tips from Queensland Government’s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud Image: The computer revolution: Databases - http://en.wikibooks.org/wiki/The_Computer_Revolution/Databases/DBMS

What will you investigate further?

Workshop evaluation

Want to know more?

More info: digitalcapability.com.auRegister for eUpdates: bit.ly/digitalcapability

Follow on: Twitter - twitter.com/digitalcapabili

Facebook - facebook.com/digitalcapabilityLinkedIn - bit.ly/DCLinkedIN

Google+ - bit.ly/DCGoogleplusPinterest - pinterest.com/vanguardvisions

vanguardvisionsconsulting.com.au

Allison Miller0400 732 270

allison@vanguardvisions.com.auvanguardvisionsconsulting.com.au

top related