information security: protecting your assets

16
INFORMATION SECURITY WWW. PENN EYC OMPU TER.COM PRO TECT ING YOUR INT E RNAL AND EXTERNAL ASS ETS

Upload: bert-penney

Post on 15-Apr-2017

154 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Information Security: Protecting Your Assets

INFORMATI

ON SECURITY

WWW.PENNEYCOMPU

TER.COM

P R O T E C T I NG Y

O U R I NT E R N A L A

N D EX T E R N A L

A S S E T S

Page 2: Information Security: Protecting Your Assets

- No matter how small or large your company is, it is important that you have a plan to secure your information assets.

Page 3: Information Security: Protecting Your Assets

WHAT IS INFORMATION SECURITY

- Information security, also referred to as InfoSec for short, is the practice of protecting information from unauthorized access. This also includes, preventing the unauthorized disclosure, use, modification, disruption, recording, and inspection of information.

Page 4: Information Security: Protecting Your Assets

DON’T WAIT… SECURE NOW - Data held on computer

systems are usually critical to the operations and overall business of an organization. However, it is common for some businesses to neglect security until their data assets become threatened or otherwise stolen.

Page 5: Information Security: Protecting Your Assets

IMPORTANCE OF INFOSEC - In business, it is not

uncommon for organizations to collect customer data. Sensitive company data or information assets are also stored internally. This is largely why it is important that organizations pay attention to information security.

Page 6: Information Security: Protecting Your Assets

- The purpose of information security is to preserve confidentiality, integrity, and availability. Let’s take a look at them quickly.

Page 7: Information Security: Protecting Your Assets

CONFIDENTIALITY

- This ensures that only those with the right to view your information have access to them. This will help protect your company from internal and external threats.

Page 8: Information Security: Protecting Your Assets

INTEGRITY

- This ensures that your data is reliable, accurate, and processed correctly. Accurate and reliable data will help your employees meet and/or exceed company expectations.

Page 9: Information Security: Protecting Your Assets

AVAILABILITY

- This ensures that data can be accessed whenever it is needed or when it is requested. Thus, improving overall efficiency.

Page 10: Information Security: Protecting Your Assets

TYPES OF INFORMATION SECURITY THREATS

- There are several information security threats and as IT systems become more advanced, it is crucial that we can clearly identify these threats so that we may stay safe.

Page 11: Information Security: Protecting Your Assets

In a 2013 TEDx presentation, Anish Bhimani, Managing Director and Chief Information Risk Officer of JP Morgan Chase, grouped potential security threats into two categories. These were disruption and fraud.

Page 12: Information Security: Protecting Your Assets

DISRUPTION   – This group consists of

“hacktivists” and people who may hate big businesses or individual companies. These people can cost an organization a lot of dollars. Some examples are service attacks, website defacements, email hacking and other disruptions.

Page 13: Information Security: Protecting Your Assets

FRAUD

- This group of people are more focused on stealing money and intellectual property. This includes identity theft, banking information theft, and other information that may lead to cash.

Page 14: Information Security: Protecting Your Assets

One recent event in regards to information theft is the email hacking of Colin Powell, former top diplomat to USA’s former president George W. Bush. According to the NY Times, Colin’s email was breached and leaked online. You may be able to imagine the potential damages that have occurred.

Page 15: Information Security: Protecting Your Assets

OWNING A CULTURE OF SECURITY AWARENESS

- Information security has to be part of the day to day thinking of your employees. It has to be thought of and seen as an important aspect of your organization’s success. Although, IT generally handles the technical aspects of security, your employees should also be made aware of the many risks that are out there.

Page 16: Information Security: Protecting Your Assets

To address potential information security risks within your organization, reach out to us at:

 Penney Computer [email protected]://www.penneycomputer.com

Thank you for your time.