.
McAfee Confidential
Security & Your Business
Anna Makratzakis & Nicola Bennet
Security & Your Business
2
Abstract: Security & Your Business
• In this session, led by Anna and Nicola from Intel Security, we will have the opportunity to explore topics around:
o Understanding the Internet, malware and the impact on your organization.
o What security means to you
o Key challenges and security risks – your experiences
o Technology & how it fits in the current business environment
.
McAfee Confidential
There are 387 new threats every minute,
or more than6 every second.
Source: McAfee Labs
What are they after?
4
• Payment card numbers / data
• Authentication credentials
• Personal information
• Sensitive organizational data
• Bank account numbers / data
• System information
• Copyrighted / trademarked material
• Trade secrets / intellectual property
• Classified information
• Medical records
.
McAfee Confidential
The Internet is filled with “malware”In 2014, 60% of small businesses experienced a cyber breachThe average cost of the worst breach was £65,000 - £115,000
5Motives: organised crime, nation states, hacktivism, boredom, fun and many more
Source: Small businesses: What you need to know about cyber security March 2015
Breach = Financial ImpactReputation & ImpactDowntimeLoss of Business
.
McAfee Confidential
Malware continues to grow…
Source: McAfee Labs ,2013
Malware continues to grow and get more sophisticated…The amount of malware continues to grow….
6
347%Growth in malware since the beginning of 2012
87%Increase in the number of new suspect URLs in 2014
.
McAfee Confidential
https://digitalsecurity.intel.com/clicksmart/en/
Are you ClickSmart??
7
https://digitalsecurity.intel.com/clicksmart/en/
.
McAfee Confidential
Are you ClickSmart??
9
.
McAfee Confidential
Are you ClickSmart??
10
.
McAfee Confidential
Dangerous Celebrity
11
McAfee Confidential
.
McAfee Confidential
The Evolving Endpoint
Servers (Physical and Virtual)
Databases
StorageRemovable Media Storage
Laptop
Desktop
Medical Devices
Tablets
ATM’s
WORKSPACEMOBILE AND FIXED
FUNCTIONDATACENTER
12
Network Printers
Smartphones
Impact of technology and Internet
13
Did you know –in the last minute
• 204 million emails sent
• 47,000 app downloads
• 1.3 million YouTube views
Access to everything, all the time from any device, from anywhere
Today employees can access
• 14.4B plus web pages
• 4 different device types per user
6 trillionspam emails detected in Q1 of 2014.
>12 millionnew suspect URLs detected every quarter.
+167%mobile malware samples in one year.
>200 millionmalware samples exist today.
Key security trends & issues
Surge in devices:laptops, desktops, servers,and mobile devices
Choosing the right vendor
Email and Web
Increase in malware threat
Personal devices accessing data
Protecting businesses is our prime objective
14
Your business challenges
Grow my business
Increase sales
Invest in marketing
Reduce expenses
Overcome cash flow issue
Limited expertise, limited budget, and limited control
15
How should you protect:
15
• Your systems? Choose an IT security solution that not only protects all of your devices (and that may mean several different solutions), and also choose HOW you are going to manage these systems
– yourself?
– your accountant?
– your IT guy?
• Your web site? Use a trusted web services company, and ask to see their security policy
• Your employees? Make them aware, good behaviour can save you from real trouble
– IT awareness training
• Your customers? Don’t expose them to malware or attack that has been passed on by your company or your employees.
– Good IT security will protect you and outside parties
History of DefiningArchitecture
– Inventor of the world’s most widely used computing architecture
– Defining countless standards used in everyday lives ranging from USB, WiFi, to IoT
– Top 10 Most Influential Brands in the World
Largest Dedicated Security Provider
– Broadest security product coverage in the industry
– Complete portfolio focused upon security
– Leadership position in 6 of 8 Gartner Security Magic Quadrants
Delivering a Next Generation Security Architecture
– Defining innovative industry approaches for collaborative and adaptive security
– Introducing security integrations which are sustainable and broadly reaching
– Developing capabilities for new security paradigms in areas such as Software Defined Datacenter, Cloud, and IoT
• McAfee for small businesses
• http://www.mcafee.com/uk/smb/index.html
• Products:
• http://www.shopmcafee.co.uk/store/mfesmb/en_GB/list/categoryID.66300400?CID=MFE-SMB014
• SMB Blog:
• https://blogs.mcafee.com/category/business/smb/
• Whitepaper SMB cyber threats
• http://www.mcafee.com/uk/resources/white-papers/wp-combating-smb-threats.pdf
• Quarterly Threat report Q3 2015
• http://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-aug-2015.pdf
• Threat Predictions for 2016
• http://www.mcafee.com/sg/resources/reports/rp-threats-predictions-2016.pdf
• ClickSmart
• https://digitalsecurity.intel.com/clicksmart/en/
What to do next………
18
QuestionsAnna Makratzakis: [email protected]
Nicola Bennet: [email protected]
If you don’t know your account manager please call us at 0800 587 [email protected]
Chat: https://admin.instantservice.com/links/6237/45413?elqTrackId=36414171E5143B229CC37541E46F61F4&elqaid=7292&elqat=2