SlideShare a Scribd company logo
Business continuity


Protecting your systems in today’s
              world
Introduction

   Lee Drake, OS-Cubed, Inc.
   Contact: ldrake@os-cubed.com
   Phone: 585-756-2444
   30 years of support
LOL Cat warning
                  Warning – this
                  presentation contains
                  the occasional LOLCAT
                  courtesy of
                  www.icanhazcheeseburg
                  er.com
Fair warning of bias… 

OS-Cubed is currently a:
 Symantec Partner

 HP Partner

 Microsoft Gold Certified Partner

 Cisco/Linksys Registered Partner
 While this presentation will consider protection
 strategies in general these are the products we have
 the most familiarity with. They are certainly NOT
 the only solution
Today’s Security Environment

   Greater interconnectivity exposes
    more security risk
   New types of security risks
   Business dependence on IT systems
    means downtime is more expensive
   Limited availability and high cost of
    experienced IT means all repairs
    cost more
“Small Business” definitions

   For this presentation “Small
    Business” will be categorized into
    the following sizes:
       1-5 “home-based business”
       5-20 “Small Business”
       20-100 “Medium business”
       > 100 large business (from an IT point
        of view)
What are the threat vectors

   Direct Internet connection
   Email/Social networking tools
   Your website (separate connection)
   Your employees
   Yourself
   Attachable portable data devices
   Hardware or software failure or
    corruption
Downtime – you can’t afford it
Is it really a threat?

Computer security costs $$ - directly to
your bottom line

    TJ Maxx = $100/released record =
     $4,500,000,000
    Average of $600 to recover a computer
     after infection
    Cost to prevent $100-200/year
    By 2011 4% of revenue could be spent
     on security (10x today’s spend
Malware
Threats defined

   Malware – virus, rootkit, spyware
       Install invisibly
       You may be infected
       Botnet infection slows down your
        computer and takes up internet
        bandwidth – sending spam or infecting
        other computers
   Recent documented infection shows
    200,000 bank accounts and CC#
    exposed!
What does that mean?

   According to Info Security
    magazine:
       “…botnets control more compromised
        machines than had been thought. Only a
        handful of criminals globally (likely a few
        hundred) have control of more than 100
        million computers, the report says.”
       “This means that cybercriminals have more
        computing power at their disposal than the
        entire world’s supercomputers combined -
        small wonder that more than 90% of all
        email worldwide is now spam”
Business Continuity

   Protect your data and your
    productivity
   Downtime costs money, and can
    lose you opportunity
   Data loss is more costly than the
    downtime
   Two types – full disaster recovery,
    and systems recovery
Information leakage

   Losing information to competitors
   Losing information to employees
    who leave
   Privacy issues
       Medical (if in that industry)
       Credit card/Customer privacy
       Employee privacy (HR)
Information Sabotage

   Employee sabotage
   Competitor sabotage
   Unintentional damage
Productivity loss

   Employee “surfing” during work
    hours
   Improper use of bandwidth (Music
    sharing sites, etc.)
   Gaming, “solitaire” etc.
   Slowdowns due to malware/spyware
   Spam processing
The good news

   With a proper set of tools,
    protecting yourself does not have to
    be difficult or time consuming
   Recent advances have lowered the
    cost of protection significantly
   New technologies make it easier to
    deploy and manage
Tools

Perimeter control Tools
 Required
       Spam blocking systems
       Firewall
   Optional
       Content management
       VPN/Encryption
       Network access control
       All-in-one devices
Endpoint Protection
Tools

   Endpoint protection (all required)
       Virus control (formerly antivirus)
       Spyware
       Personal firewall
       Personal spam control
       Endpoint protection (all of above)
Tools

   Business continuity
       Tape backup
       Online backup
       Disk to disk backup
       Network Attached Storage
       Offsite storage
       PC Backup

       (one onsite, one offsite required)
HR Practices
Tools

   System management and
    monitoring tools
   HR Best practices
       Employee manual (Required)
       Manager training
       Employee orientation sessions
       Employee termination procedures
Backup and fail in that order!
Backup explained

   With low price USB, Firewire and
    Network Attached storage devices
    the landscape for backup has
    changed
   Backup to disk is fast, reliable and
    allows almost instant restore and
    rebuild – even over a network
   New disk imaging products allow
    “snapshot backups” for instant
    restore
Symantec Ghost/Backup Exec
System Recovery

   Every important computer in your
    organization should be protected by
    Ghost or BESR (corporate version)
   Reduces recovery time for even a
    total disaster to a couple hours
   Backups are faster, more reliable
    and easier, require no human
    intervention
   Can be used for offsite
Still need offsite backup

   Protects asset in the case of total
    destruction of server room (natural
    disaster, fire, sabotage, etc)
   Can be used as history for deep-
    restore
   Snapshots of business at various
    points.
Offsite backup options

   Online options
       Require significant bandwidth – do not
        underestimate requirements
       Restore times frequently longer and
        can be more complex
       Frequently do not backup system state
        – files only
       Require a monthly fee for storage, that
        increases with the amount stored
       If you trust 3rd party vendor can be
        more secure
Offsite Backup options

   Tape
       Compact size makes off-site easier
       Backups require physical intervention
        (changing tapes)
       Tapes deteriorate and need to be
        changed out every 1-2 years for new
        tapes
       Can represent a security risk if stolen
       For a monthly fee Iron mountain will
        retain, store and exchange tapes
Offsite backup options
   Taking USB drives offsite
       More attractive as drives size shrink to
        that of tapes
       Drives much more susceptible to
        environmental damage
       Similar downside characteristics as
        tape
       Requires “human intervention”
       Can be a solution for home businesses
       Iron Mountain will also store this media
Endpoint Protection
Endpoint protection defined

   Controlling what happens at the
    workstation
       Virus protection
       Spyware protection
       Device control (usb drives, other
        attachable devices)
       Workstation firewall (software firewall)
       Initial access to the network
       Can include email client based spam
        control
Endpoint protection options
   4-5 major players in this space
   Features and capabilities frequently
    leapfrog
   Best advice is to pick one and stick to
    it, don’t swap back and forth
   Major providers include: Symantec,
    McAfee, AVG, CA, and Kapersky
   Symantec 2010 got PC World 2nd
    place, and places consistently 1st or
    2nd
Don’t overdo it…

   Multiple products to protect your
    endpoint are generally NOT needed
   Use one product for best results,
    easiest management and fastest
    speed
   Multiple products slow your system
    down by doing repeated tests
   Use of clean-up products should be
    limited to infected machines
Protecting your network
Firewall appliances

   Firewalls and content management
    systems prevent direct hacking
    from outside world
   Can be used to control what
    resources your internal users can
    reach in the outside world (CM)
   Are your first line of defense against
    hackers
Perimeter Firewall limitations

   Once something is behind the
    firewall, it can spread quickly
   Wireless access points behind
    firewalls are susceptible to hacking
    attempts
   Trojans and other malware operate
    from behind the firewall and can be
    difficult or impossible to block as
    their traffic looks like web traffic
Endpoint firewalls

   Firewalls at the client can prevent
    spread behind the corporate firewall
   Endpoint protection typically
    includes a firewall at each client
   Windows comes with a built-in
    firewall at each client, which should
    be on (at a minimum)
Spam Control
Other appliances

   Spam control appliances sit between
    you and your email server, or
    between your email server and the
    world
   They allow constantly updated spam
    signature and source control
   Can significantly reduce spam-load
   Can be expensive to configure and
    maintain – higher risk of false
    negatives.
Other appliances

   VPN – Virtual Private Network
       Extends your network to home or mobile
        machines
       VPN connected machines should be
        subject to the same rigorous security
        requirements as internal machines
       Can allow work from home easily
       Frequently built into perimeter firewalls
       Are even affordable at home office
        prices, but usually require a fixed IP
        address (not a home account)
Other stopgap methods

   Use an alternate browser (Firefox,
    Chrome etc.) – however ALL
    browsers have security issues
   Use an alternate OS – Linux and
    Mac OSes have a limited audience,
    thus are not as big targets. ALL
    operating systems have
    vulnerabilities though
   Properly configured and patched
    any of these can be secure
Updates and patches
   You or your provider should frequently
    check for and apply new patches
   Subscribe to Microsoft and/or Symantec
    RSS feeds for emergency security
    bulletins
   Select ALL critical updates, and any
    security or stability related optional
    updates
   Run updates manually every other
    month
Network Administration
HR Guidelines
   Every company should have an employee
    manual that details:
       What is considered appropriate internet use
       Specific consequences of inappropriate use
       Rules about using copyrighted and unlicensed
        materials, pornography, etc.
       Email use policy
       Note that there is no expectation of privacy
       A policy regarding use of unapproved software
       A reminder that data tampering is a federal crime
       A nondisclosure agreement regarding company
        data
Drive security
Physical security

   USB drives change everything
       Exposure risks from downloading data
        goes up
       Can “boot to USB” and gain access to
        files without the OS or Endpoint loaded
       Can put browser and files on usb drive
        and surf anything anywhere without
        installing on PC
       Should seriously consider locking USB
        to read-only status
Do you trust your vendors?

   All your vendors – not just IT
    vendors
   I’ve seen server rooms where
    contractors are working unattended
   Do not assume because of
    someone’s job that they’re not a
    computer hacker
Server rooms should be locked

   Access to key trouble points should
    be locked from employee access
       Network hubs and switches
       Servers and network appliances
       Routers and firewalls
       Detachable USB drives and tapes
Password security
Password security

   Passwords should be at least 8
    characters
   A combination of letters and
    numbers
   Something people can remember
   Don’t make them change them too
    often or they’ll just write them
    down
Fingerprint authentication
Fingerprint authentication

   Finally a valid solution with newer,
    cheaper technology
   Works best with Window’s Vista’s
    ability to have multiple users logged
    on simultaneously
   Not foolproof – can be fooled by a
    number of tricks
What about encryption?
   For sensitive data it can be invaluable
   MUST have a safe and accessible place to
    look up the password in case it is lost or
    you are hurt
   Data will be UNRETRIEVABLE without the
    password, however storing password with
    data won’t work
   Can affect the validity and availability of
    backup data
Do you trust your protection?
Home Business typical
configuration

   Under 5 users
       Inexpensive firewall (no content control
        – sonicwall/linksys/netgear)
       Retail endpoint protection (Symantec,
        AVG, Etc.)
       Endpoint spam control, or use 3rd party
        service
       Ghost for individual workstations
       NAS for in-house backup
       USB Hard disk exchanged offsite for
        offsite backup
Small Business typical
configuration

   5-20 users
       Centralized computer server
          Tape or disk backup for offsite
          Centralized licensed endpoint protection

          Depending on email – either centralized
           virus and spam or endpoint
          NAS for localized emergency recovery

       Endpoint protection at systems
       Mid-range firewall/spam/content
        (Sonicwall, Cisco) plus OpenDNS
Medium Business typical
configuration
   Perimeter
       Firewall – both directions (Cisco, Sonicwall)
       Content management appliance or OpenDNS
       Spam control appliance (Barracuda)
   Server
       Centralized endpoint protection
       Centralized systems management and monitoring
       Protected by local disk imaging and tape or
        offsite backup
   Endpoint
       Endpoint protection
       Local disk imaging of key systems
Large business

   Best advice is to hire a security
    expert to design a system for you
   Recommend going with specialized
    appliances
   Limiting the number of different
    vendors simplifies management
   Solve with an overall approach not
    individual band-aids
Notes and resources

   On my website www.os-cubed.com
   At this specific shortcut:
    http://bit.ly/IEC12-09
   Off my linked in and facebook
    accounts (Search for Lee Drake in
    both)
Contact Information

OS-Cubed, Inc.
Lee Drake, CEO
274 Goodman St. N, Suite A401
Rochester, NY 14607
Ldrake@os-cubed.com
www.os-cubed.com

More Related Content

PPTX
L49 slides
PPTX
Cyber Security and GDPR Made Easy
PDF
Mis Data Sheet 2010
PDF
PDF
V mware vdi environment
PDF
Cybersecurity Concerns You Should be Thinking About
PPT
Panda Cloud Protection - protectie maxima, costuri reduse
PPTX
Symantec Web Security Solutions
L49 slides
Cyber Security and GDPR Made Easy
Mis Data Sheet 2010
V mware vdi environment
Cybersecurity Concerns You Should be Thinking About
Panda Cloud Protection - protectie maxima, costuri reduse
Symantec Web Security Solutions

What's hot (20)

PPTX
2.7 what ict can provide
PPTX
2.6 backup and recovery
PPTX
Introduction to Network and System Administration
PDF
RSA 2010 Kevin Rowney
PDF
4.it activities one pager
DOCX
Final2[1]
PDF
Desktop Services
PPTX
8 Sure-Fire Ways to Manage Your Desktops
PPTX
You Will Be Breached
PDF
Computrace Laptop Security Solutions
PPTX
CH11-Managing Computing Securely, Safely and Ethically
PDF
Is your data at risk? Why physical security is insufficient for laptop computers
PDF
CryptionPro Hdd Flyer English
PPT
PPS
Harris Bdr
PPTX
CS5032 L19 cybersecurity 1
PDF
A Guide To SMB Network Security Compliance Research Group(1)
PPTX
What's New with Ivanti’s Enterprise Licensing Agreement?
PPTX
What if
PDF
ESET Enterprise
2.7 what ict can provide
2.6 backup and recovery
Introduction to Network and System Administration
RSA 2010 Kevin Rowney
4.it activities one pager
Final2[1]
Desktop Services
8 Sure-Fire Ways to Manage Your Desktops
You Will Be Breached
Computrace Laptop Security Solutions
CH11-Managing Computing Securely, Safely and Ethically
Is your data at risk? Why physical security is insufficient for laptop computers
CryptionPro Hdd Flyer English
Harris Bdr
CS5032 L19 cybersecurity 1
A Guide To SMB Network Security Compliance Research Group(1)
What's New with Ivanti’s Enterprise Licensing Agreement?
What if
ESET Enterprise
Ad

Viewers also liked (6)

PPT
1511 Sponsorship Opportunity
PPTX
Creating a content managed facebook app
PPTX
Artisan bread in 5 minutes
PDF
Sistrix - SEOnTheBeach
PPT
Conservative Surgery In Ectopic
PPT
These Are A Few Of My Favorite Things
1511 Sponsorship Opportunity
Creating a content managed facebook app
Artisan bread in 5 minutes
Sistrix - SEOnTheBeach
Conservative Surgery In Ectopic
These Are A Few Of My Favorite Things
Ad

Similar to Business Continuity 2009 (20)

PPT
Desktop Security 8 9 07
DOCX
PROJECT REPORT.docx
PPT
Panda Cloud Services
PPT
How to improve endpoint security on a SMB budget
POT
MOP Technical Presentation.Ppt
PPT
Info Sec2007 End Point Final
PDF
Beyond layers and peripheral antivirus security
PPTX
Internet safety and you
PPT
Computer Security Issues
PPT
Guard Era Security Overview Preso (Draft)
PPTX
2014CyberSecurityProject
PDF
amrapali builders @@hacking printers.pdf
ODP
Ece seminar 20070927
PPT
It's Your Move: The Changing Game of Endpoint Security
PPT
Top Tactics For Endpoint Security
PPT
Basics of IT security
PDF
Free Guide-to-cybersecurity-fundamentals.pdf
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPT
Event - Internet Thailand - Total Security Perimeters
PPT
Prueba de Presentacion
Desktop Security 8 9 07
PROJECT REPORT.docx
Panda Cloud Services
How to improve endpoint security on a SMB budget
MOP Technical Presentation.Ppt
Info Sec2007 End Point Final
Beyond layers and peripheral antivirus security
Internet safety and you
Computer Security Issues
Guard Era Security Overview Preso (Draft)
2014CyberSecurityProject
amrapali builders @@hacking printers.pdf
Ece seminar 20070927
It's Your Move: The Changing Game of Endpoint Security
Top Tactics For Endpoint Security
Basics of IT security
Free Guide-to-cybersecurity-fundamentals.pdf
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Event - Internet Thailand - Total Security Perimeters
Prueba de Presentacion

More from OS-Cubed, Inc. (8)

PPTX
Using Office365 to build collaborative teams
PPTX
Microsoft Office365 cloud update - Fall 2014
PPTX
Not For Profits – raising funds
PPTX
FIRST Robotics Team 1511 Building sustainability presentation
PPTX
Building a development culture
PPTX
Social Networking Pix Show
PPT
1511 Press Releases
PPT
1511 Corporate Subteam Ppt
Using Office365 to build collaborative teams
Microsoft Office365 cloud update - Fall 2014
Not For Profits – raising funds
FIRST Robotics Team 1511 Building sustainability presentation
Building a development culture
Social Networking Pix Show
1511 Press Releases
1511 Corporate Subteam Ppt

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Classroom Observation Tools for Teachers
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
master seminar digital applications in india
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
01-Introduction-to-Information-Management.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Insiders guide to clinical Medicine.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Pharma ospi slides which help in ospi learning
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
TR - Agricultural Crops Production NC III.pdf
O7-L3 Supply Chain Operations - ICLT Program
Renaissance Architecture: A Journey from Faith to Humanism
Classroom Observation Tools for Teachers
Week 4 Term 3 Study Techniques revisited.pptx
master seminar digital applications in india
Microbial diseases, their pathogenesis and prophylaxis
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose
2.FourierTransform-ShortQuestionswithAnswers.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Insiders guide to clinical Medicine.pdf
Anesthesia in Laparoscopic Surgery in India
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
Pharma ospi slides which help in ospi learning
human mycosis Human fungal infections are called human mycosis..pptx

Business Continuity 2009

  • 1. Business continuity Protecting your systems in today’s world
  • 2. Introduction  Lee Drake, OS-Cubed, Inc.  Contact: ldrake@os-cubed.com  Phone: 585-756-2444  30 years of support
  • 3. LOL Cat warning Warning – this presentation contains the occasional LOLCAT courtesy of www.icanhazcheeseburg er.com
  • 4. Fair warning of bias…  OS-Cubed is currently a:  Symantec Partner  HP Partner  Microsoft Gold Certified Partner  Cisco/Linksys Registered Partner While this presentation will consider protection strategies in general these are the products we have the most familiarity with. They are certainly NOT the only solution
  • 5. Today’s Security Environment  Greater interconnectivity exposes more security risk  New types of security risks  Business dependence on IT systems means downtime is more expensive  Limited availability and high cost of experienced IT means all repairs cost more
  • 6. “Small Business” definitions  For this presentation “Small Business” will be categorized into the following sizes:  1-5 “home-based business”  5-20 “Small Business”  20-100 “Medium business”  > 100 large business (from an IT point of view)
  • 7. What are the threat vectors  Direct Internet connection  Email/Social networking tools  Your website (separate connection)  Your employees  Yourself  Attachable portable data devices  Hardware or software failure or corruption
  • 8. Downtime – you can’t afford it
  • 9. Is it really a threat? Computer security costs $$ - directly to your bottom line  TJ Maxx = $100/released record = $4,500,000,000  Average of $600 to recover a computer after infection  Cost to prevent $100-200/year  By 2011 4% of revenue could be spent on security (10x today’s spend
  • 11. Threats defined  Malware – virus, rootkit, spyware  Install invisibly  You may be infected  Botnet infection slows down your computer and takes up internet bandwidth – sending spam or infecting other computers  Recent documented infection shows 200,000 bank accounts and CC# exposed!
  • 12. What does that mean?  According to Info Security magazine:  “…botnets control more compromised machines than had been thought. Only a handful of criminals globally (likely a few hundred) have control of more than 100 million computers, the report says.”  “This means that cybercriminals have more computing power at their disposal than the entire world’s supercomputers combined - small wonder that more than 90% of all email worldwide is now spam”
  • 13. Business Continuity  Protect your data and your productivity  Downtime costs money, and can lose you opportunity  Data loss is more costly than the downtime  Two types – full disaster recovery, and systems recovery
  • 14. Information leakage  Losing information to competitors  Losing information to employees who leave  Privacy issues  Medical (if in that industry)  Credit card/Customer privacy  Employee privacy (HR)
  • 15. Information Sabotage  Employee sabotage  Competitor sabotage  Unintentional damage
  • 16. Productivity loss  Employee “surfing” during work hours  Improper use of bandwidth (Music sharing sites, etc.)  Gaming, “solitaire” etc.  Slowdowns due to malware/spyware  Spam processing
  • 17. The good news  With a proper set of tools, protecting yourself does not have to be difficult or time consuming  Recent advances have lowered the cost of protection significantly  New technologies make it easier to deploy and manage
  • 18. Tools Perimeter control Tools  Required  Spam blocking systems  Firewall  Optional  Content management  VPN/Encryption  Network access control  All-in-one devices
  • 20. Tools  Endpoint protection (all required)  Virus control (formerly antivirus)  Spyware  Personal firewall  Personal spam control  Endpoint protection (all of above)
  • 21. Tools  Business continuity  Tape backup  Online backup  Disk to disk backup  Network Attached Storage  Offsite storage  PC Backup  (one onsite, one offsite required)
  • 23. Tools  System management and monitoring tools  HR Best practices  Employee manual (Required)  Manager training  Employee orientation sessions  Employee termination procedures
  • 24. Backup and fail in that order!
  • 25. Backup explained  With low price USB, Firewire and Network Attached storage devices the landscape for backup has changed  Backup to disk is fast, reliable and allows almost instant restore and rebuild – even over a network  New disk imaging products allow “snapshot backups” for instant restore
  • 26. Symantec Ghost/Backup Exec System Recovery  Every important computer in your organization should be protected by Ghost or BESR (corporate version)  Reduces recovery time for even a total disaster to a couple hours  Backups are faster, more reliable and easier, require no human intervention  Can be used for offsite
  • 27. Still need offsite backup  Protects asset in the case of total destruction of server room (natural disaster, fire, sabotage, etc)  Can be used as history for deep- restore  Snapshots of business at various points.
  • 28. Offsite backup options  Online options  Require significant bandwidth – do not underestimate requirements  Restore times frequently longer and can be more complex  Frequently do not backup system state – files only  Require a monthly fee for storage, that increases with the amount stored  If you trust 3rd party vendor can be more secure
  • 29. Offsite Backup options  Tape  Compact size makes off-site easier  Backups require physical intervention (changing tapes)  Tapes deteriorate and need to be changed out every 1-2 years for new tapes  Can represent a security risk if stolen  For a monthly fee Iron mountain will retain, store and exchange tapes
  • 30. Offsite backup options  Taking USB drives offsite  More attractive as drives size shrink to that of tapes  Drives much more susceptible to environmental damage  Similar downside characteristics as tape  Requires “human intervention”  Can be a solution for home businesses  Iron Mountain will also store this media
  • 32. Endpoint protection defined  Controlling what happens at the workstation  Virus protection  Spyware protection  Device control (usb drives, other attachable devices)  Workstation firewall (software firewall)  Initial access to the network  Can include email client based spam control
  • 33. Endpoint protection options  4-5 major players in this space  Features and capabilities frequently leapfrog  Best advice is to pick one and stick to it, don’t swap back and forth  Major providers include: Symantec, McAfee, AVG, CA, and Kapersky  Symantec 2010 got PC World 2nd place, and places consistently 1st or 2nd
  • 34. Don’t overdo it…  Multiple products to protect your endpoint are generally NOT needed  Use one product for best results, easiest management and fastest speed  Multiple products slow your system down by doing repeated tests  Use of clean-up products should be limited to infected machines
  • 36. Firewall appliances  Firewalls and content management systems prevent direct hacking from outside world  Can be used to control what resources your internal users can reach in the outside world (CM)  Are your first line of defense against hackers
  • 37. Perimeter Firewall limitations  Once something is behind the firewall, it can spread quickly  Wireless access points behind firewalls are susceptible to hacking attempts  Trojans and other malware operate from behind the firewall and can be difficult or impossible to block as their traffic looks like web traffic
  • 38. Endpoint firewalls  Firewalls at the client can prevent spread behind the corporate firewall  Endpoint protection typically includes a firewall at each client  Windows comes with a built-in firewall at each client, which should be on (at a minimum)
  • 40. Other appliances  Spam control appliances sit between you and your email server, or between your email server and the world  They allow constantly updated spam signature and source control  Can significantly reduce spam-load  Can be expensive to configure and maintain – higher risk of false negatives.
  • 41. Other appliances  VPN – Virtual Private Network  Extends your network to home or mobile machines  VPN connected machines should be subject to the same rigorous security requirements as internal machines  Can allow work from home easily  Frequently built into perimeter firewalls  Are even affordable at home office prices, but usually require a fixed IP address (not a home account)
  • 42. Other stopgap methods  Use an alternate browser (Firefox, Chrome etc.) – however ALL browsers have security issues  Use an alternate OS – Linux and Mac OSes have a limited audience, thus are not as big targets. ALL operating systems have vulnerabilities though  Properly configured and patched any of these can be secure
  • 43. Updates and patches  You or your provider should frequently check for and apply new patches  Subscribe to Microsoft and/or Symantec RSS feeds for emergency security bulletins  Select ALL critical updates, and any security or stability related optional updates  Run updates manually every other month
  • 45. HR Guidelines  Every company should have an employee manual that details:  What is considered appropriate internet use  Specific consequences of inappropriate use  Rules about using copyrighted and unlicensed materials, pornography, etc.  Email use policy  Note that there is no expectation of privacy  A policy regarding use of unapproved software  A reminder that data tampering is a federal crime  A nondisclosure agreement regarding company data
  • 47. Physical security  USB drives change everything  Exposure risks from downloading data goes up  Can “boot to USB” and gain access to files without the OS or Endpoint loaded  Can put browser and files on usb drive and surf anything anywhere without installing on PC  Should seriously consider locking USB to read-only status
  • 48. Do you trust your vendors?  All your vendors – not just IT vendors  I’ve seen server rooms where contractors are working unattended  Do not assume because of someone’s job that they’re not a computer hacker
  • 49. Server rooms should be locked  Access to key trouble points should be locked from employee access  Network hubs and switches  Servers and network appliances  Routers and firewalls  Detachable USB drives and tapes
  • 51. Password security  Passwords should be at least 8 characters  A combination of letters and numbers  Something people can remember  Don’t make them change them too often or they’ll just write them down
  • 53. Fingerprint authentication  Finally a valid solution with newer, cheaper technology  Works best with Window’s Vista’s ability to have multiple users logged on simultaneously  Not foolproof – can be fooled by a number of tricks
  • 54. What about encryption?  For sensitive data it can be invaluable  MUST have a safe and accessible place to look up the password in case it is lost or you are hurt  Data will be UNRETRIEVABLE without the password, however storing password with data won’t work  Can affect the validity and availability of backup data
  • 55. Do you trust your protection?
  • 56. Home Business typical configuration  Under 5 users  Inexpensive firewall (no content control – sonicwall/linksys/netgear)  Retail endpoint protection (Symantec, AVG, Etc.)  Endpoint spam control, or use 3rd party service  Ghost for individual workstations  NAS for in-house backup  USB Hard disk exchanged offsite for offsite backup
  • 57. Small Business typical configuration  5-20 users  Centralized computer server  Tape or disk backup for offsite  Centralized licensed endpoint protection  Depending on email – either centralized virus and spam or endpoint  NAS for localized emergency recovery  Endpoint protection at systems  Mid-range firewall/spam/content (Sonicwall, Cisco) plus OpenDNS
  • 58. Medium Business typical configuration  Perimeter  Firewall – both directions (Cisco, Sonicwall)  Content management appliance or OpenDNS  Spam control appliance (Barracuda)  Server  Centralized endpoint protection  Centralized systems management and monitoring  Protected by local disk imaging and tape or offsite backup  Endpoint  Endpoint protection  Local disk imaging of key systems
  • 59. Large business  Best advice is to hire a security expert to design a system for you  Recommend going with specialized appliances  Limiting the number of different vendors simplifies management  Solve with an overall approach not individual band-aids
  • 60. Notes and resources  On my website www.os-cubed.com  At this specific shortcut: http://bit.ly/IEC12-09  Off my linked in and facebook accounts (Search for Lee Drake in both)
  • 61. Contact Information OS-Cubed, Inc. Lee Drake, CEO 274 Goodman St. N, Suite A401 Rochester, NY 14607 Ldrake@os-cubed.com www.os-cubed.com