Securing Your Business Network

Download Report

Transcript Securing Your Business Network

Protecting Your Business Against the
Unthinkable
SBA Houston, August 2, 2006
Mark Piening
Sr. Director Worldwide SMB Marketing
Small Businesses Are Interacting In New Ways
Protecting your business
2 – 2005 Symantec Corporation. All rights reserved.
Your Business Is Changing
►
Technology surrounds our work and private lives
►
The Internet has redefined business dynamics
►
Email anytime, anywhere
►
Instant messages at a blink of an eye
►
Wireless everything – mobile phones, wireless networks
►
Access to work from home, hotel, airport
►
Huge amounts of data stored on computers and servers
Protecting your business
3 – 2005 Symantec Corporation. All rights reserved.
With Opportunities Come Risks
35% of Small Businesses Use
Instant Messaging (IM)
IM threats grew by
1,693% in 2005
57% of SMBs with websites
generate significant revenue
online
In 2005, US consumers lodged more
than 196,503 internet related fraud
complaints with the FTC
Usage of converged mobile
devices grew 50% worldwide
One in five organizations said they
have sustained financial losses due
to attack on mobile data platforms
Sources: IMlogic Threat Center report, Jan 2006; Interland Small and Medium-sized Business Barometer, September 2005; Federal trade commission, 2006; IDC, 2005; PC World, April 2006;
Protecting your business
4 – 2005 Symantec Corporation. All rights reserved.
The Problem…
Malicious Attacks
Environmental
Impacts
 Viruses
 Worms
 Power Outages
 Trojan Horses
 Floods
Common Denominator:
 Phishing
 Tornadoes
 SpyWare Loss of System and/or
Important
 Etc.
Information
Protecting your business
User Mishaps
Hardware/Software
 End User Error
 Theft
 Fat Finger
 Hard Drive
 Motherboard/Power
 System Corruption
 Failed Patch or Update
5 – 2005 Symantec Corporation. All rights reserved.
Evolution of Virus/Worm Threats
The latest threats now spread orders of magnitude faster than
years ago, from months to nearly seconds
Contagion Period
►
months
Program
Viruses
Macro
Viruses
E-mail
Worms
days
Network
Worms
hrs
mins
Flash
Worms
Contagion Period
secs
1990
Protecting your business
Time
2006
6 – 2005 Symantec Corporation. All rights reserved.
Today’s Attacks Are Motivated By Financial Gain
With the growth in phishing and other financial motivated attacks, Small Businesses
are at risk
Top Targeted Industries
Source:
Symantec
Internet Security
Threat Report
Volume IX
Published:
March 2006
Small Business is often a target because they do not always have adequate protection
Protecting your business
7 – 2005 Symantec Corporation. All rights reserved.
Threat Impact On Small Businesses
Direct Losses
Indirect Losses
• Theft, Money, Digital Assets
• Computer Resources
• Trade Secrets
• Consumer Information
• Loss of Potential Sales
• Negative Brand Impact
• Loss of Competitive Advantage
• Loss of Goodwill
Productivity Losses
Legal Exposure
• Diversion of Funds
• Continuity Expenses
• Corruption of Data
• Recovery Expenses
• Failure to Meet Contracts
• Failure to Meet Privacy Regulations
• Illegal User Activity
• Director Liability
Protecting your business
8 – 2005 Symantec Corporation. All rights reserved.
But Symantec Can Help…..
Security
Data Protection
For all network tiers: the gateway, the server, the
desktop, including PCs, laptops, handhelds
Backup and recovery of data and systems
Data Center Management
Services
Simplifies administration of heterogeneous
environments and provides continuous availability
of mission critical data and applications
Full range of services to assist our customers
manage and mitigate IT risk
Plan
Protecting your business
Design
Build
Manage
9 – 2005 Symantec Corporation. All rights reserved.
A Simple Blueprint For Windows Security And
Availability
System
►
Server management & recovery
►
Desktop management & recovery
Data
►
Data backup and recovery
►
Client and server security
Application
►
Mail security
►
Exchange archiving
Policy
Protecting your business
►
Proactive alerts
►
Endpoint compliance
►
Email discovery/compliance
10 – 2005 Symantec Corporation. All rights reserved.
Symantec’s Resources For Small Business
http://www.symantec.com/small_business/
Protecting your business
11 – 2005 Symantec Corporation. All rights reserved.
Recommended Practices
1.
Prevent infection with antivirus and antispyware software


2.
Stop intruders with a firewall

3.
Deploy security patches and fixes as soon as they are available
Use the latest operating system versions
Create strong passwords and change them frequently

5.
Use a firewall on all desktops, laptops, and servers
Stay on top of security updates


4.
Install antivirus on all desktops, laptops, and servers
Check for virus definitions daily or set for automatic updates
Don’t allow Web browsers to remember passwords/private data
Open email responsibly


Scrutinize attachments before opening them; avoid ones with unusual
extensions
Don’t open or reply to unsolicited mail
Protecting your business
12 – 2005 Symantec Corporation. All rights reserved.
Recommended Practices, cont.
6. Browse the Web with caution


Don’t ever give personal information to a Web site unless you see a small padlock
or key icon in the browser’s toolbar
Don’t type confidential information in Instant Messaging/Chat programs
7. Back up your desktops and servers regularly

Back up vital data daily and store critical backups offsite
8. Make remote connections secure


Require remote users to use antivirus and firewall software
Use a Virtual Private Network (VPN)
9. Lock down wireless networks

Install a firewall at the wireless access point
10. Ensure the physical security of your equipment


Never leave wireless devices unattended
Use the screen locking feature when you leave your computer
Protecting your business
13 – 2005 Symantec Corporation. All rights reserved.
Thank You