protect your data - macc · protect your data presentation by: steve erlbacher macc tech support....

33
Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support

Upload: others

Post on 01-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Protect Your Data

Presentation by:Steve Erlbacher

MACC Tech Support

Page 2: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Cybersecurity• Cybersecurity is defined as “the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.”

• It sounds scary, but what does it really mean?• Think of your business like a castle. In today’s electronic world, your castle is under siege… every day… all day!  

• Criminals use fake emails, scan ports on your firewalls, and infect websites to try to break in.

• In today’s connected world, cybersecurity is a topic that is very broad and being secure requires a significate effort. 

Page 3: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Passwords• How good is your password? • Common password policies require numbers, capital and lower case letters and even special characters.

• Many security companies are now pushing for the use of longer passwords.

• Avoid using personal information or family names as passwords.  • Change your passwords. 

Page 4: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

•Make sure your firewall is only opened to approved traffic.• If you don’t have a good firewall, make it a priority to put one in place as soon as possible. 

•Many firewalls, such as the SonicWALLs sold by MACC, can help you fight the intruders with advanced security services. 

Seal the holes

Page 5: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

• Backups, Backups, Backups• All important files should be stored on your server or on a network location and this location should be backed up on a regular basis. 

• This is the best defense against data loss.  • If a files gets infected or deleted, a backup will give you the ability to retrieve that file with minimal downtime. 

Page 6: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

• These steps along with user education will help reduce the impact that viruses, malware, exploits and hacking attempts will have on your network. 

• Not sure where to start? We can help! MACCs Technical Support team can guide you from start to finish, or any step in between. 

• We can make product and planning recommendations as well as help you implement the solutions you need!

Page 7: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

New developments in ransomware• Ransomware as a service

• Ransomware as a service allows individuals who are not technically advanced to purchase and deploy malicious malware to unsuspecting victims. 

• This allows anyone, regardless of their cyber know‐how, to become a hacker by simply downloading the virus, setting a ransom and payment deadlines, and attempting to trick someone into infecting his or her computer. 

• If the victim pays the ransom, the original author will get a cut of the ransom and the rest will go to the individual who deployed the attack. 

Page 8: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

New developments in ransomware• Wannacrypt/Wannacry

• The biggest ever cyber attack in Internet history. In the first few hours, over 200,000 machines were infected.

• This ransomware was written to target an exploit known as Eternal Blue.

• In the case of this particular strain of Ransomware, Microsoft deemed it important enough to release an update for their unsupported systems. This was a highly unusual action for Microsoft and should demonstrate just how severe this attack was. 

• You can find more information from Microsoft at: https://blogs.technet.microsoft.com/msrc/2017/05/12/customer‐guidance‐for‐wannacrypt‐attacks/

Page 9: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Tired of Ransomware?• MACC has recently partnered with DELL to bring to you their latest endpoint security solution; Dell Threat Defense.

• DELL Threat Defense is a cloud‐based solution that uses artificial intelligence to protect against today’s advanced threats.

• Designed for the needs of growing businesses with limited in‐house IT staff.

• Configure access controls with least privilege in mind. The less the user has access to the fewer the files that can be encrypted.

Page 10: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Phishing• Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. 

• For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, suggesting that there is a problem with your account. 

• Phishing attacks may also appear to come from other types of organizations, such as charities. Attackers often take advantage of current events and certain times of the year.

Page 11: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

• We can lessen the chances of getting infected and reduce the impact of an infection if we follow some simple steps.• Be Vigilant 

• Be aware of the emails you receive and who sent them.  • If you receive an email that appears to be out of the ordinary, verify with the sender prior to opening.  

• Always use caution when opening attachments, particularly if they are ones that you don’t recognize.  

• Stick to work related websites while on the job and immediately close pop‐ups that declare you have a virus or a problem with your PC.

Phishing – Protect yourself

Page 12: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Phishing – Protect yourself• Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. 

• If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.

• Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (.com vs .net). Also most legitimate sites use HTTPS

• Do not enable macro scripts in documents emailed to you. • Hover your mouse over Hyperlinks to see where they will take you.

Page 13: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Emails:Bait or real?

Testing your Phishing knowledge 

Page 14: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 15: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 16: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 17: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 18: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 19: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 20: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 21: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Websites:Imposters or real?

Page 22: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 23: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 24: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 25: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 26: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 27: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against
Page 28: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Updates• Regularly check that your computer is up to date.• Run automatic updates to keep important updates installed and protecting you.

• Windows 10 does this for you.• Keep your software up to date. 

Page 29: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Air Gapped Backups• Air gapped backups have a time gap between backups and live data. Some examples of possible Air Gapped backup devices are Tapes or RDX cartridges, Flash Drives, and Cloud/Internet based backups with point‐in‐time snapshots. 

• In order for any of these to be truly air gapped, the backups need to be independent of each other and stored in a different location. 

• We have seen numerous cases where viruses and Ransomware infect the computer or server and encrypt files. It can also encrypt the files on Drop Box, Google Drive, or Microsoft OneDrive if in an always connected setup.

Page 30: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

MACC Air Gapped Backups• MACC’s Back‐Up Solution (MBUS) can back up all the data and documents on your company’s Windows server at a regular intervals and store it at a secure remote location. 

• There is no restriction on the types or number of files you can secure. If you lose your data for any reason, MACC can quickly restore access using only an Internet connection.

• All backup services are completely automated and require no effort by your company’s employees.

• If there is an emergency, access to your data is available within 24 hours.• The service is administered and monitored by MACC’s Technical Support Team.

Page 31: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

MACC Air Gapped Backups• MACC’s Application Recovery Service (MARS) can back up all your MACC databases nightly.

• All backup services are completely automated and require no effort by your company’s employees.

• If there is an emergency, access to your data is available within 24 hours.

• In the event of a disaster, your MARS backup is activated within MACC’s hosted MSaaS environment. All you need to get back to work is a workstation with an internet connection. 

• The service is administered and monitored by MACC’s Technical Support Team.

Page 32: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Disaster Recovery• Do you know what to do if disaster strikes?

• Maintain good backups and have a recovery plan. • Know who to contact.• MARS is a great disaster recovery option to get your MACC software back up and running quickly.

• Verify your backups. MARS includes an annual, non‐disruptive test so you can verify your ability to be back up and running quickly if disaster strikes.

Page 33: Protect Your Data - MACC · Protect Your Data Presentation by: Steve Erlbacher MACC Tech Support. Cybersecurity •Cybersecurity is defined as “the state of being protected against

Questions?