x2039x203A Nick Ross nickrosssophoscom Cybercrime What you need to know to keep your data safe x2039x203A 8 new internet users added every second Pingdom x2039x203A 7 Billi ID: 179607
Download Pdf The PPT/PDF document "Sales Engineering" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
â¹#⺠Nick Ross Sales Engineering nick.ross@sophos.com Cybercrime What you need to know to keep your data safe â¹#⺠8 new internet users added every second Pingdom â¹#⺠7 Billion People Current best estimates â¹#⺠4 â¹#⺠â¹#⺠Why protect the data? No longer a nice to have, itâs a must have! 1. Itâs the lifeblood of most organizations 1. Compliance regulations require it be protected 1. Customers are demanding their personal data is secure â¹#⺠CyberCrime â illegal activities undertaken by criminals for financial gain Cabinet office â¹#⺠Mal ware icious Soft â¹#⺠All Time Number of Unique Malware Samples 79,000,000 â¹#⺠60 â 70% of malware is directly monetized US Federal Board of Trade â¹#⺠â¹#⺠â¹#⺠⢠Your c omputing power ⢠Your personal and corporate information ⢠Your online identity What is the target? â¹#⺠Email ⢠Social engineering ⢠Links to malicious s ites ⢠Data stealing forms â¹#⺠⢠A new malicious URL every 2 - 3 seconds ⢠User actively looking for something ⢠Silent âdrive - byâ downloads Web â¹#⺠350,000 new malicious URLs are detected every day, and 80% are legitimate SophosLabs â¹#⺠Whatâs Trending? â¹#⺠Browse via search engine Browse direct Compromised Website â¹#⺠â¹#⺠⢠www.sophos.com ⢠nakedsecurity.sophos.com Want to know more? â¹#⺠Malware Myth #1: Iâm too small to be a target ⢠Large organizations often work with a supply chain of smaller companies ⢠Fewer IT resources = easier to target ⢠Malware used in APTs targeting specific organizations/industries has appeared years later â¹#⺠Malware Myth #2: I have no data worth stealing ⢠What about your competitors? ⢠Do you deal with data on behalf of others? ï¿® You may have liability for other peopleâs data ï¿® You certainly have liability for your own employeeâs data â¹#⺠Malware Myth #3: So what? I have desktop AV ⢠Protecting the desktop is a good start ⢠Macs arenât immune ⢠Need to assess and where necessary, block, incoming and outgoing traffic ⢠The web is the no. 1 source of malware ⢠70% of email traffic is spam but not all is harmless â¹#⺠Do the Basics Do the Basics Educate your users Enforce the right policies Patching Layered Protection Desktop anti - malware no longer enough on its own Protect at the gateway as well as the endpoint Protect your online assets Make sure your website is secure Think about your social media presence Mobile Security Install AV Manage Donât allow Jailbreaking or rooting Stick to Google Play store So what can I do? â¹#⺠Do the Basics Do the Basics Educate your users Enforce the right policies Patching ⢠Think about physical security ⢠Donât plug in strange USB drives / CDs ⢠Think before clicking links / attachments ⢠Implement and enforce good passwords ⢠Only allow access to the data thatâs required ⢠Remove old users ⢠Limit the amount of software installed ⢠Keep it up to date and patched ⢠ENCRYPT YOUR DATA So what can I do? â¹#⺠⢠Desktop AV is a must ⢠This includes Macs, and Android Mobile ⢠Keep it up to date, monitor it. ⢠The gateway is the first point of entry to the network and should be controlled ⢠A basic firewall isnât enough ⢠Invest in a security device that can also scan into traffic in depth â Unified Threat Management ⢠Filter Spam and web traffic Layered Protection Desktop anti - malware no longer enough on its own Protect at the gateway as well as the endpoint So what can I do? â¹#⺠⢠Who needs mobile access? ⢠Android is vulnerable â use AV ⢠Use a proper MDM or EMM solution ⢠Enforce policies on Jailbreaking and Rooting Control Apps ⢠Think about network access in the office ⢠Consider how you make use of public WiFi Mobile Security Install AV Manage Donât allow Jailbreaking or rooting Stick to Google Play store So what can I do? â¹#⺠⢠Who hosts your website? ⢠Think also about things like Outlook Anywhere and SharePoint ⢠Use a Web Application Firewall ⢠Use 2FA for remote access ⢠Who has access to the corporate Facebook/Twitter accounts? Protect your online assets Make sure your website is secure Think about your social media presence So what can I do? â¹#⺠Todayâs security approach is falling behind INCOMPLETE Always one more thing to deploy and manage COMPLICATED Too hard to configure, too much to monitor INEFFECTIVE Not keeping up with advanced threats â¹#⺠Complex solutions arenât solutions. We make security for the real world. Simple security is better security Kris Hagerman, CEO Sophos â¹#⺠AT HOME AND ON THE MOVE Mobile Control Endpoint Security SafeGuard Encryption HEADQUARTERS Endpoint Security SafeGuard Encryption REMOTE OFFICE 1 NextGen Firewall Secure Wi - Fi Endpoint Security SafeGuard Encryption Secure Wi - Fi Secure VPN Client Mobile Control Reputation Data ⢠Active Protection SophosLabs Correlated intelligence ⢠Content Classification Administration SOPHOS CLOUD Web Application Firewall Secure Email Gateway Secure Web Gateway Mobile Control Network Storage Antivirus Server Security Guest Wi - Fi UTM NextGen Firewall Secure Web Gateway Secure Email Gateway Web Application Firewall REMOTE OFFICE 2 Secure Wi - Fi Endpoint Security SafeGuard Encryption Mobile Control Secure VPN RED â¹#⺠36 â¹#⺠© Sophos Ltd. All rights reserved. nick.ross@sophos.com