it security for small business
TRANSCRIPT
![Page 1: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/1.jpg)
ITSECURITY
![Page 2: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/2.jpg)
WHAT IS IT SECURITY?• Definition: Ensuring the security of
resources in a computing environment.
• Resources include:• Applications• Data• Network• Hardware
![Page 3: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/3.jpg)
THE 3 ASPECTS1. Vulnerability
2. Exploit
3. Threat
![Page 4: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/4.jpg)
WHAT IS VULNERABLE – OS AND SOFTWARE• Are OS and software updates applied?
• Do you have a reliable antivirus installed and up to date?
![Page 5: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/5.jpg)
WHAT IS VULNERABLE – DATA AND NETWORKAre your files adequately secured ensuring only authorised people have access to sensitive information?
Is your network secure?
A survey done by Tripwire showed that 30% of routers are running default passwords.
![Page 6: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/6.jpg)
WHAT IS VULNERABLE – COMMUNICATIONAre you using a secure email service?
Is your email password secure?
Do you lock your PC when away from it?
![Page 7: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/7.jpg)
THE EXPLOIT – VIRUSES AND MALWAREWhat could happen if infected:
Account names and passwords could be compromised which may lead to fraudulent activity
Files could be accessed and copied
There may be corruption of hardware or software resulting in computer downtime, slowed computer or slowed network
![Page 8: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/8.jpg)
THE EXPLOIT – PHISHINGAn example of a fraudulent site attempting to infect a computer with malware:
![Page 9: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/9.jpg)
THE EXPLOIT – PHISHINGAnother example of an email received by a client recently:
![Page 10: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/10.jpg)
THE EXPLOIT – WEAK OR LACK OF PASSWORDS
![Page 11: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/11.jpg)
THE EXPLOIT – WEAK OR LACK OF PASSWORDS
*compiled from files containing millions of stolen passwords posted online during the previous year
![Page 12: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/12.jpg)
THE EXPLOIT – WEAK OR LACK OF PASSWORDS
![Page 13: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/13.jpg)
THE EXPLOIT – THEFT OF DATA BY EMPLOYEESAre your files adequately secured ensuring only authorised people have access to sensitive information?
Could you quickly prevent an employing from having access to files and email?
What would it mean if an employee had your client database or sensitive financial information?
![Page 14: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/14.jpg)
THE THREATStudies done by Symantec, ZDNet and several other agencies show:
![Page 15: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/15.jpg)
THE THREAT
![Page 16: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/16.jpg)
WHAT CAN YOU DO?Ensure that you are using a reputable/reliable antivirus software
Have strong passwords for all of your devices
Have strong passwords for your network, do not use the defaults!
Make sure that your files are stored securely and that only authorised people have access to sensitive information
Exercise vigilance and caution online, if in doubt CALL US!
![Page 17: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/17.jpg)
THE OFFERFor SBN group members only!
50% off our Managed Antivirus (for next 12 months)
Usually $50 +GST/year - reduced to $25 +GSTLess than $0.50 per week!
Need to confirm today!
![Page 18: IT Security for Small Business](https://reader034.vdocument.in/reader034/viewer/2022042723/58cf6d041a28abe6688b492d/html5/thumbnails/18.jpg)
www.digitaloffice.com.au1300 553 783
Questions