SlideShare a Scribd company logo
8
Most read
11
Most read
14
Most read
A continuation of the Managed Services Webinar Series
Live Webinar:
Webinar Audio:
You can dial the telephone numbers located on your webinar panel.
Or listen in using your headphones or computer speakers.
Welcome!
• Presentation is roughly 30-45 minutes
• All phone lines are muted
• If anyone has any questions during this webinar – please type them in your
Questions Box located at the bottom of your webinar panel
Webinar Details
Today’s Presenters
Steve Moisoff
Net@Work
Senior Solutions Executive
Cando Wango
Net@Work
IT Solutions Architect
180+ Business
Technology Architects
and Consultants
IT Road
Mapping
& Strategic Planning
Business
Process Review
Ecosystem
BI, Analytics
& Reporting
Cloud & IT
Managed Services
ERP/
Accounting
Web Development
& e-Commerce
Sister Company
Payment
Processing
SWYPE
Sister Company
CRM &
Marketing
Automation
HRMS/
Employer Solutions
Document
Management
Compliance
Solutions:
Sales Tax | Fixed
Assets
Managed Print
Services
Sister Company
Net@Work
Partner Alliance
Program
Our Previous Webinar Topics
Access on our website: netatwork.com/resource
✓ Managed IT Services: What It Is and Why It Matters
✓ The Myths & Realities of Managed IT Services
✓ Uncovering the Business Value of Managed IT Services
✓ Data Recovery Best Practices - Survival of the Fittest
✓ Information Security Awareness: How to Avoid the Bitcoin Nightmare
All Recorded Webinars Available to Watch On-Demand:
• Endpoint Protection…What Is It? What are the various elements
of Endpoint Protection?
• What is your organization’s risk in the absence of Endpoint
Protection?
• How to ensure that you are significantly mitigating the risk of
compromised performance & loss of data
• What organizational standards are critical to define and
implement?
• What questions should you be asking of yourself and your staff?
• Next Steps/Recommendations
Agenda
“A company that includes 1,000
employees with poor online hygiene
has 1,000 insecure endpoints.”
Anuj Goel, co-founder of Cyware Labs
Email Defense
End Point Protection
PerimeterThe Essential Elements
• Perimeter – e.g. the Firewall…inspecting data coming in and
out of your corporate network
• Email Defense – Filtering, Inspection and protection of
email boundaries
• End Point Protection – Zero Day Threat Protection,
Anti-Virus definitions
• Backup Solutions – Full Recovery of critical systems
• Training for End Users – Regular education sessions and
testing of knowledge on company standard security posture
Backup Solutions
End User Training
Overview
Does your company have a standard (policy) for Staff
Accessing Personal Email Accounts on Corporate Devices?
❑ Yes
❑ No
❑ Don’t think we need one
❑ Don’t know
Does your Company have a mobile device or
BYOD (bring Your own device) standard (policy) defined?
❑ Yes
❑ No
❑ Don’t think we need one
❑ Don’t know
Polling Questions
Endpoint Protection…What Is It??
Conceptually, viable Endpoint Protection (and
Response) solutions need to provide three broad
buckets of functionality:
• Prevent/Detect to block malicious code and prevent
infection with a high rate of detection
• Analysis perform forensics on the endpoints
• Response contain and remediate endpoints
For the purposes of this presentation endpoints are
considered any user devices such as desktops, laptops,
Mobile devices (e.g. tablets, phones, etc.)
By The Numbers…
Nothing in IT changes more quickly and requires more sophistication
than effective network and data security.
Although precise estimates vary, somewhere around half of all security incidents
affect organizations with less than 1,000 employees. (PC Magazine 2018)
Small fish still make big target, though. In a Visa and National Cyber Security Alliance (NCSA)
survey of 1,000 small business owners, 85 percent of respondents believed that enterprises
are more targeted than they are, yet another survey by the same group found that
20% of small businesses suffered a data breach.
Why Endpoint Protection?
What is your organization risk in the absence of Endpoint Protection?
Target
SMB's IT administrator faces the same threats that teams of his or her enterprise
counterparts face, except that he or she is likely to face them alone.
Critical Data Loss
As long as your data holds value, criminals don't care how big your company is. Small
businesses carry information just as valuable as that of larger organizations. It takes less
effort to steal financial data and act on it.
Mobility
Many SMB’s employees rely heavily on mobile devices to do their jobs. This means that
mobile platforms represent as rich a target to hackers and malware as office-based systems.
Reputation/Liability
Criminals use the systems of a small business to exploit trust relationships with larger
businesses (e.g. the Target breach FireEye).
Understand the
landscape of
Endpoint
Protection vendors
Patch Mgt
Desktop
maintenance
Group Policies
Use Policy Security Policy
Mobile Device
Management
Mitigating the Risk of Compromised Performance & Loss of Data
Anti-Virus
(anomaly driven –
heuristic behavior)
Local Firewall
Settings
Detection and
Notification system
Event Management
Change Mgt and
Controls
Dual factor
authentication
Ensure that the following areas are being addressed:
How does your primary IT vendor
manage your IT issues today?
❑ Through Time and Materials
❑ By Managed Services
❑ Neither
❑ Both
Polling Questions
Organizational IT Standards Directly Related To Endpoints are Critical
Not implementing the correct standards could result in creating a false
sense of security amongst users and management, and creating a
management nightmare for the administrator.
Standards should be preconfigured using best practices, with the ability
to quickly and easily make changes should the administrator desire.
Examples of standards directly related to endpoints include:
• Ability to locate and remote wipe devices
• Password Strength and frequency of rotation
• Application control (who or what groups have access to what
applications)
• Wi-Fi Settings (access and how often passwords are rotated)
• Encryption on Laptops as a policy
What Questions Should You Be Asking Of Yourself And Your Staff?
What organizational policies are critical to define and
implement?
• When is the last time we did an audit of our technology environment?
(To assess the data protection and controls around your business processes)
• Who in our organization is responsible to ensure we are protected
from new IT threats? (i.e. do we have any risk mgt process in place around
these issues?)
• Does our IT staff undergo regular training and education?
• When was the last time you reviewed your standards (policies)?
“What's good enough?”
Review and understand the implications of your standards.
The challenge, then, is:
• to select an IT solution that can fend off known threats as well as
detect odd behavior that hasn't been seen before, and
• to manage your endpoints throughout their lifecycle.
Next Steps
Summary & Recommendations
SMB’s need to consider doing the following:
• Understand & document current Endpoint requirements
• Review standards on an ongoing basis
• Determine and administer the proper tools
• Capture and field appropriate alerts/attacks
• Ensure IT staff has ongoing training
Decide if your company:
Has the resources to commit to these actions OR as many companies
are doing: selecting a vendor that can align to this current business
climate with those tools, processes and budget that best fit your needs.
Based on this presentation do you feel
your IT environment is at:
❑ High Risk
❑ Medium Risk
❑ Little Risk
❑ No Risk
❑ No Idea
Polling Questions
Please type in
your questions
Any Questions?
Thank You For Attending!
Connect with
646-293-1735
www.netatwork.com
netatwork.com/blog
Net@Work YouTube
Follow us on Twitter: @netatwork_corp
Follow Net@Work on LinkedIn
Follow Net@Work on Google+
Follow Net@Work on Facebook
Contact your Net@Work Account Manager for any questions or concerns.
Or you can reach out to us via the information below!
Steve Moisoff | Net@Work
Managed Service Solutions Executive
Phone: 212.997.5200 Ext. 1735
Direct: 646.293.1735
smoisoff@netatwork.com
www.netatwork.com

More Related Content

PPTX
Endpoint Security Pres.pptx
PPSX
Security Awareness Training
PDF
Information Security Awareness
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
PPTX
Iso 27001 isms presentation
PPT
IT Security management and risk assessment
 
PDF
Cybersecurity Roadmap Development for Executives
PDF
Cybersecurity Skills in Industry 4.0
Endpoint Security Pres.pptx
Security Awareness Training
Information Security Awareness
Information Assurance And Security - Chapter 1 - Lesson 3
Iso 27001 isms presentation
IT Security management and risk assessment
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Skills in Industry 4.0

What's hot (20)

PPTX
Bit locker Drive Encryption: How it Works and How it Compares
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
An introduction to SOC (Security Operation Center)
PPTX
Digital forensic tools
PPTX
Computer forensic ppt
PPTX
E mail Investigation
PPSX
Next-Gen security operation center
PPT
Physical Security
PPTX
Enterprise Security Architecture Design
PDF
NIST SP 800 30 Flow Chart
PDF
GDPR most actionable cheatsheet and checklist by cyberstratg
PPT
Linux forensics
PPT
CCNA Security 02- fundamentals of network security
PPTX
All About Cybersecurity Frameworks.pptx
PPTX
NIST Critical Security Framework (CSF)
PPTX
Cybersecurity Risk Management Program and Your Organization
PPTX
Chapter 1 Security Framework
PPTX
Data Backup (IT) Lecture Slide # 5
PPT
information security management
Bit locker Drive Encryption: How it Works and How it Compares
Cybersecurity roadmap : Global healthcare security architecture
An introduction to SOC (Security Operation Center)
Digital forensic tools
Computer forensic ppt
E mail Investigation
Next-Gen security operation center
Physical Security
Enterprise Security Architecture Design
NIST SP 800 30 Flow Chart
GDPR most actionable cheatsheet and checklist by cyberstratg
Linux forensics
CCNA Security 02- fundamentals of network security
All About Cybersecurity Frameworks.pptx
NIST Critical Security Framework (CSF)
Cybersecurity Risk Management Program and Your Organization
Chapter 1 Security Framework
Data Backup (IT) Lecture Slide # 5
information security management
Ad

Similar to Endpoint Security & Why It Matters! (20)

PPTX
NARCA Presentation - IT Best Practice
PDF
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
PDF
Andy Malone - Microsoft office 365 security deep dive
PDF
Infocon Bangladesh 2016
PPTX
Information security and protecting your business
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PPTX
Secure Iowa Oct 2016
PPTX
ISS CAPSTONE TEAM
DOCX
Why Portland Businesses Need Both Managed IT and Cybersecurity Services.docx
PPTX
Data Security Platforms: What Your Business Must Know
PDF
Group 4 Networks Assessment Outline
PPTX
INFRAGARD 2014: Back to basics security
PPT
ITSM Toolset Selection
PPTX
Why SMBs Outsource IT to MSPs
DOCX
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
PDF
Andrew Shepherd - Rethink the service desk role to change its image forever
PPT
Chap001
PPT
Institute for the entrepreneur v1r3
NARCA Presentation - IT Best Practice
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Andy Malone - Microsoft office 365 security deep dive
Infocon Bangladesh 2016
Information security and protecting your business
BSIDES DETROIT 2015: Data breaches cost of doing business
Secure Iowa Oct 2016
ISS CAPSTONE TEAM
Why Portland Businesses Need Both Managed IT and Cybersecurity Services.docx
Data Security Platforms: What Your Business Must Know
Group 4 Networks Assessment Outline
INFRAGARD 2014: Back to basics security
ITSM Toolset Selection
Why SMBs Outsource IT to MSPs
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Andrew Shepherd - Rethink the service desk role to change its image forever
Chap001
Institute for the entrepreneur v1r3
Ad

More from Net at Work (20)

PDF
Sage HRMS Configuration and Business Response and HR Planning
PDF
Employer Update & Getting Business Back on Track
PDF
Tips on the IRS & DOL Employer Tax Credits & Loans
PDF
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
PDF
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
PDF
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
PDF
Managing Through COVID-19
PPTX
Tax Compliance in the Wake of COVID-19 What’s Changed
PDF
Fixed Assets are Suddenly Mobile “At Home” Assets
PPTX
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
PDF
Coping with Covid-19: Keeping the Workplace Moving
PDF
How Engaged Employees Affect the Bottom Line
PDF
Transformative HR Technology For Nonprofits
PDF
Document Capture: Never Touch a Document Again
PDF
Benefits of Abila MIP Payroll
PDF
Sage Intelligence for Sage 100
PDF
How the IRS 2019 Form W-4 Will Change Payroll
PDF
Cloud-based Payroll Outsourcing: Why The Shift?
PDF
Digital Marketing Automation Built for Microsoft Dynamics 365
PDF
HR Strategic Planning
Sage HRMS Configuration and Business Response and HR Planning
Employer Update & Getting Business Back on Track
Tips on the IRS & DOL Employer Tax Credits & Loans
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
Managing Through COVID-19
Tax Compliance in the Wake of COVID-19 What’s Changed
Fixed Assets are Suddenly Mobile “At Home” Assets
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Coping with Covid-19: Keeping the Workplace Moving
How Engaged Employees Affect the Bottom Line
Transformative HR Technology For Nonprofits
Document Capture: Never Touch a Document Again
Benefits of Abila MIP Payroll
Sage Intelligence for Sage 100
How the IRS 2019 Form W-4 Will Change Payroll
Cloud-based Payroll Outsourcing: Why The Shift?
Digital Marketing Automation Built for Microsoft Dynamics 365
HR Strategic Planning

Recently uploaded (20)

PDF
Understanding Forklifts - TECH EHS Solution
PDF
Digital Strategies for Manufacturing Companies
PPTX
L1 - Introduction to python Backend.pptx
PDF
System and Network Administration Chapter 2
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
history of c programming in notes for students .pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Introduction to Artificial Intelligence
PDF
AI in Product Development-omnex systems
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
medical staffing services at VALiNTRY
PDF
System and Network Administraation Chapter 3
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Understanding Forklifts - TECH EHS Solution
Digital Strategies for Manufacturing Companies
L1 - Introduction to python Backend.pptx
System and Network Administration Chapter 2
Wondershare Filmora 15 Crack With Activation Key [2025
ISO 45001 Occupational Health and Safety Management System
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
CHAPTER 2 - PM Management and IT Context
Which alternative to Crystal Reports is best for small or large businesses.pdf
Operating system designcfffgfgggggggvggggggggg
Odoo Companies in India – Driving Business Transformation.pdf
history of c programming in notes for students .pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Introduction to Artificial Intelligence
AI in Product Development-omnex systems
Softaken Excel to vCard Converter Software.pdf
How to Migrate SBCGlobal Email to Yahoo Easily
medical staffing services at VALiNTRY
System and Network Administraation Chapter 3
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...

Endpoint Security & Why It Matters!

  • 1. A continuation of the Managed Services Webinar Series Live Webinar: Webinar Audio: You can dial the telephone numbers located on your webinar panel. Or listen in using your headphones or computer speakers. Welcome!
  • 2. • Presentation is roughly 30-45 minutes • All phone lines are muted • If anyone has any questions during this webinar – please type them in your Questions Box located at the bottom of your webinar panel Webinar Details
  • 3. Today’s Presenters Steve Moisoff Net@Work Senior Solutions Executive Cando Wango Net@Work IT Solutions Architect
  • 4. 180+ Business Technology Architects and Consultants IT Road Mapping & Strategic Planning Business Process Review Ecosystem BI, Analytics & Reporting Cloud & IT Managed Services ERP/ Accounting Web Development & e-Commerce Sister Company Payment Processing SWYPE Sister Company CRM & Marketing Automation HRMS/ Employer Solutions Document Management Compliance Solutions: Sales Tax | Fixed Assets Managed Print Services Sister Company Net@Work Partner Alliance Program
  • 5. Our Previous Webinar Topics Access on our website: netatwork.com/resource ✓ Managed IT Services: What It Is and Why It Matters ✓ The Myths & Realities of Managed IT Services ✓ Uncovering the Business Value of Managed IT Services ✓ Data Recovery Best Practices - Survival of the Fittest ✓ Information Security Awareness: How to Avoid the Bitcoin Nightmare All Recorded Webinars Available to Watch On-Demand:
  • 6. • Endpoint Protection…What Is It? What are the various elements of Endpoint Protection? • What is your organization’s risk in the absence of Endpoint Protection? • How to ensure that you are significantly mitigating the risk of compromised performance & loss of data • What organizational standards are critical to define and implement? • What questions should you be asking of yourself and your staff? • Next Steps/Recommendations Agenda
  • 7. “A company that includes 1,000 employees with poor online hygiene has 1,000 insecure endpoints.” Anuj Goel, co-founder of Cyware Labs
  • 8. Email Defense End Point Protection PerimeterThe Essential Elements • Perimeter – e.g. the Firewall…inspecting data coming in and out of your corporate network • Email Defense – Filtering, Inspection and protection of email boundaries • End Point Protection – Zero Day Threat Protection, Anti-Virus definitions • Backup Solutions – Full Recovery of critical systems • Training for End Users – Regular education sessions and testing of knowledge on company standard security posture Backup Solutions End User Training Overview
  • 9. Does your company have a standard (policy) for Staff Accessing Personal Email Accounts on Corporate Devices? ❑ Yes ❑ No ❑ Don’t think we need one ❑ Don’t know Does your Company have a mobile device or BYOD (bring Your own device) standard (policy) defined? ❑ Yes ❑ No ❑ Don’t think we need one ❑ Don’t know Polling Questions
  • 10. Endpoint Protection…What Is It?? Conceptually, viable Endpoint Protection (and Response) solutions need to provide three broad buckets of functionality: • Prevent/Detect to block malicious code and prevent infection with a high rate of detection • Analysis perform forensics on the endpoints • Response contain and remediate endpoints For the purposes of this presentation endpoints are considered any user devices such as desktops, laptops, Mobile devices (e.g. tablets, phones, etc.)
  • 11. By The Numbers… Nothing in IT changes more quickly and requires more sophistication than effective network and data security. Although precise estimates vary, somewhere around half of all security incidents affect organizations with less than 1,000 employees. (PC Magazine 2018) Small fish still make big target, though. In a Visa and National Cyber Security Alliance (NCSA) survey of 1,000 small business owners, 85 percent of respondents believed that enterprises are more targeted than they are, yet another survey by the same group found that 20% of small businesses suffered a data breach. Why Endpoint Protection?
  • 12. What is your organization risk in the absence of Endpoint Protection? Target SMB's IT administrator faces the same threats that teams of his or her enterprise counterparts face, except that he or she is likely to face them alone. Critical Data Loss As long as your data holds value, criminals don't care how big your company is. Small businesses carry information just as valuable as that of larger organizations. It takes less effort to steal financial data and act on it. Mobility Many SMB’s employees rely heavily on mobile devices to do their jobs. This means that mobile platforms represent as rich a target to hackers and malware as office-based systems. Reputation/Liability Criminals use the systems of a small business to exploit trust relationships with larger businesses (e.g. the Target breach FireEye).
  • 13. Understand the landscape of Endpoint Protection vendors Patch Mgt Desktop maintenance Group Policies Use Policy Security Policy Mobile Device Management Mitigating the Risk of Compromised Performance & Loss of Data Anti-Virus (anomaly driven – heuristic behavior) Local Firewall Settings Detection and Notification system Event Management Change Mgt and Controls Dual factor authentication Ensure that the following areas are being addressed:
  • 14. How does your primary IT vendor manage your IT issues today? ❑ Through Time and Materials ❑ By Managed Services ❑ Neither ❑ Both Polling Questions
  • 15. Organizational IT Standards Directly Related To Endpoints are Critical Not implementing the correct standards could result in creating a false sense of security amongst users and management, and creating a management nightmare for the administrator. Standards should be preconfigured using best practices, with the ability to quickly and easily make changes should the administrator desire. Examples of standards directly related to endpoints include: • Ability to locate and remote wipe devices • Password Strength and frequency of rotation • Application control (who or what groups have access to what applications) • Wi-Fi Settings (access and how often passwords are rotated) • Encryption on Laptops as a policy
  • 16. What Questions Should You Be Asking Of Yourself And Your Staff? What organizational policies are critical to define and implement? • When is the last time we did an audit of our technology environment? (To assess the data protection and controls around your business processes) • Who in our organization is responsible to ensure we are protected from new IT threats? (i.e. do we have any risk mgt process in place around these issues?) • Does our IT staff undergo regular training and education? • When was the last time you reviewed your standards (policies)?
  • 17. “What's good enough?” Review and understand the implications of your standards. The challenge, then, is: • to select an IT solution that can fend off known threats as well as detect odd behavior that hasn't been seen before, and • to manage your endpoints throughout their lifecycle. Next Steps
  • 18. Summary & Recommendations SMB’s need to consider doing the following: • Understand & document current Endpoint requirements • Review standards on an ongoing basis • Determine and administer the proper tools • Capture and field appropriate alerts/attacks • Ensure IT staff has ongoing training Decide if your company: Has the resources to commit to these actions OR as many companies are doing: selecting a vendor that can align to this current business climate with those tools, processes and budget that best fit your needs.
  • 19. Based on this presentation do you feel your IT environment is at: ❑ High Risk ❑ Medium Risk ❑ Little Risk ❑ No Risk ❑ No Idea Polling Questions
  • 20. Please type in your questions Any Questions?
  • 21. Thank You For Attending! Connect with 646-293-1735 www.netatwork.com netatwork.com/blog Net@Work YouTube Follow us on Twitter: @netatwork_corp Follow Net@Work on LinkedIn Follow Net@Work on Google+ Follow Net@Work on Facebook Contact your Net@Work Account Manager for any questions or concerns. Or you can reach out to us via the information below! Steve Moisoff | Net@Work Managed Service Solutions Executive Phone: 212.997.5200 Ext. 1735 Direct: 646.293.1735 smoisoff@netatwork.com www.netatwork.com