SlideShare a Scribd company logo
Why your business needs prevention & protection
measures.
[in-fer-mey-shuh n si-kyoo r-i-tee], noun
1. the safeguarding of your organization’s
information and information systems
from unauthorized access.
Loss of confidential
information and data
breach liability are
HUGE RISKS
for businesses.
When cyber security is not part of your business
process, it leaves a company vulnerable to a
range of security issues.
When cyber security is not part of your business
process, it leaves a company vulnerable to a
range of security issues.
The average cost of data breaches reached over
$3.5 MILLION in 2014!
Why is it vital in 2015?
Cyber Security: Why your business needs protection & prevention measures
In 2013:
In 2013:
61% of all targeted attacks were against
small and medium sized businesses.
In 2013:
61% of all targeted attacks were against
small and medium sized businesses.
There was a 91% increase in attacks
against businesses.
In 2013:
61% of all targeted attacks were against
small and medium sized businesses.
There was a 91% increase in attacks
against businesses.
There was a 62% increase in the
number of breaches.
In 2013:
61% of all targeted attacks were against
small and medium sized businesses.
There was a 91% increase in attacks
against businesses.
There was a 62% increase in the
number of breaches.
More than 552 million identities
were exposed via breaches.
Cyber Security: Why your business needs protection & prevention measures
Small business cyber attacks have nearly doubled since 2011!
Cyber Security: Why your business needs protection & prevention measures
Cyber breaches can extend beyond a company’s
firewalls.When this happens, contractors are also
included within the realm of risk.
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
What assets are most valuable to
the business?
What assets are most valuable to
the business?
Where are these assets supposed to reside
and where do they actually reside?
Who has access to them and how
are they managed?
What assets are most valuable to
the business?
Where are these assets supposed to reside
and where do they actually reside?
Cyber Security: Why your business needs protection & prevention measures
Conduct a cyber vulnerability or penetration
test at least once per year.
Conduct a cyber vulnerability or penetration
test at least once per year.
Can any unintended parties access
critical assets?
Cyber Security: Why your business needs protection & prevention measures
Up to 30% of data breaches are due to the operation of a
negligent employee or contractor.
Cyber Security: Why your business needs protection & prevention measures
Accept that security will be compromised.
Accept that security will be compromised.
Consider “cyber” in all activities.
Accept that security will be compromised.
Consider “cyber” in all activities.
Focus on critical information assets.
Accept that security will be compromised.
Consider “cyber” in all activities.
Focus on critical information assets.
Be prepared to respond.
Get the basics right.
Accept that security will be compromised.
Consider “cyber” in all activities.
Focus on critical information assets.
Be prepared to respond.
Chris Roach is Managing Director at CBIZ Risk & Advisory
Services. If you have questions about cyber security and
what it means to your business, Chris can be reached at
croach@cbiz.com.
For more information, visit www.cbiz.com/cybersecurity

More Related Content

PDF
Security Awareness Training
PPTX
Cyber security
PPTX
PPTX
Cyber Security for the Small Business Experience
PDF
Cybersecurity Employee Training
PDF
Information Security Awareness for everyone
PDF
Cyber Security Awareness
PPT
Cyber Security and Cyber Awareness
Security Awareness Training
Cyber security
Cyber Security for the Small Business Experience
Cybersecurity Employee Training
Information Security Awareness for everyone
Cyber Security Awareness
Cyber Security and Cyber Awareness

What's hot (20)

PPTX
Cybercrime and Security
PPTX
Understanding cyber resilience
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Cyber Security 03
PDF
HOW AI CAN HELP IN CYBERSECURITY
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PDF
Basics of Cyber Security
PDF
1. introduction to cyber security
PDF
NIST Cybersecurity Framework - Mindmap
PDF
Cyber security training
PDF
Cybersecurity Awareness Infographics
PPTX
Information Security Awareness
PDF
NIST Cybersecurity Framework 101
PPTX
Ethical Hacking PPT (CEH)
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PDF
The Proactive Approach to Cyber Security
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPT
IT Security Awareness-v1.7.ppt
PPTX
Social engineering
PDF
Cyber Security 2017 Challenges
Cybercrime and Security
Understanding cyber resilience
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security 03
HOW AI CAN HELP IN CYBERSECURITY
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Basics of Cyber Security
1. introduction to cyber security
NIST Cybersecurity Framework - Mindmap
Cyber security training
Cybersecurity Awareness Infographics
Information Security Awareness
NIST Cybersecurity Framework 101
Ethical Hacking PPT (CEH)
Cybersecurity Attack Vectors: How to Protect Your Organization
The Proactive Approach to Cyber Security
Application Security | Application Security Tutorial | Cyber Security Certifi...
IT Security Awareness-v1.7.ppt
Social engineering
Cyber Security 2017 Challenges
Ad

Viewers also liked (12)

PPTX
Cyber crime and security ppt
PPTX
Cyber security presentation
PPTX
Cyber security
PPTX
BIG DEAL: CYBER SECURITY AND SMALL BUSINESS
PPTX
Cyber security for small businesses
PDF
Visualizing Threats: Network Visualization for Cyber Security
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Information & Cyber Security Risk
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
PPTX
Audit presentation
PDF
7 cyber security questions for boards
PDF
Top Cyber Security Trends for 2016
Cyber crime and security ppt
Cyber security presentation
Cyber security
BIG DEAL: CYBER SECURITY AND SMALL BUSINESS
Cyber security for small businesses
Visualizing Threats: Network Visualization for Cyber Security
Securing your digital world cybersecurity for sb es
Information & Cyber Security Risk
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Audit presentation
7 cyber security questions for boards
Top Cyber Security Trends for 2016
Ad

Similar to Cyber Security: Why your business needs protection & prevention measures (20)

PDF
Cyber security guide
PDF
How Will Cybersecurity Help Your Business.pdf
PDF
Ri cyber-security-for-your-small-business
DOCX
The Importance of Cybersecurity to Secure Business Operations.docx
PPTX
Cyber Security: Most Important Aspect of a Successful Business
PDF
The Impact of Cyber Threats: Protecting Your Business in the Digital Age
PPTX
nist_small_business_fundamentals_july_2019.pptx
PDF
Information and Cyber Warfare
PPTX
Cybersecurity: How Safe Is Your Organization?
PDF
BIZGrowth Strategies - Cybersecurity Special Edition
PDF
What is Cybersecurity and Its Importance to Business
PPTX
Information Security For Small Business
PPTX
Information security for small business
PPTX
Module 8 - External Crisis – Changing Technology.pptx
PDF
Cybersecurity a short business guide
PDF
Small Business Administration Recommendations
PDF
best coffee beans in the world, americano
PDF
Cyber Risks & Liabilities - Cyber Security for Small Businesses
PDF
Five principles for improving your cyber security
PDF
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber security guide
How Will Cybersecurity Help Your Business.pdf
Ri cyber-security-for-your-small-business
The Importance of Cybersecurity to Secure Business Operations.docx
Cyber Security: Most Important Aspect of a Successful Business
The Impact of Cyber Threats: Protecting Your Business in the Digital Age
nist_small_business_fundamentals_july_2019.pptx
Information and Cyber Warfare
Cybersecurity: How Safe Is Your Organization?
BIZGrowth Strategies - Cybersecurity Special Edition
What is Cybersecurity and Its Importance to Business
Information Security For Small Business
Information security for small business
Module 8 - External Crisis – Changing Technology.pptx
Cybersecurity a short business guide
Small Business Administration Recommendations
best coffee beans in the world, americano
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Five principles for improving your cyber security
Cyber Security Threats For Small Business- Detox Technologies.pdf

More from CBIZ, Inc. (20)

PDF
BIZGrowth Strategies — Cybersecurity Special Edition 2023
PDF
BIZGrowth Strategies - Back to Basics Special Edition
PDF
The Advantage — Summer 2023
PDF
BIZGrowth Strategies - Workforce & Talent Optimization Special Edition
PDF
BIZGrowth Newsletter - Economic Slowdown Solutions Special Edition
PDF
Connections Help Law Practice Efficiently Obtain $5 Million Line of Credit
PDF
Custom Communication Plan & Active Enrollment Result in Increased Consumerism
PDF
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
PDF
BIZGrowth Strategies - Summer 2022
PDF
Inflation, Interest Rates & the Disruption to CRE
PDF
CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...
PDF
Rethinking Total Compensation to Retain Top Talent
PDF
Common Labor Shortage Risks & Tips to Mitigate Your Exposures
PDF
How the Great Resignation Affects the Tax Function
PDF
Using Technology to Secure Talent
PDF
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
PDF
BIZGrowth Strategies - The Great Resignation Special Edition
PDF
Tax incentive alert KS
PDF
CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)
PDF
Changes in Lease Accounting Are About to Get Real for CRE
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies - Back to Basics Special Edition
The Advantage — Summer 2023
BIZGrowth Strategies - Workforce & Talent Optimization Special Edition
BIZGrowth Newsletter - Economic Slowdown Solutions Special Edition
Connections Help Law Practice Efficiently Obtain $5 Million Line of Credit
Custom Communication Plan & Active Enrollment Result in Increased Consumerism
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
BIZGrowth Strategies - Summer 2022
Inflation, Interest Rates & the Disruption to CRE
CBIZ Quarterly Manufacturing and Distribution "Hot Topics" Newsletter (May-Ju...
Rethinking Total Compensation to Retain Top Talent
Common Labor Shortage Risks & Tips to Mitigate Your Exposures
How the Great Resignation Affects the Tax Function
Using Technology to Secure Talent
Experienced Consulting Approach Leads Engineering Firm to the Right CFO
BIZGrowth Strategies - The Great Resignation Special Edition
Tax incentive alert KS
CBIZ Quarterly Commercial Real Estate "Hot Topics" Newsletter (Jan-Feb 2022)
Changes in Lease Accounting Are About to Get Real for CRE

Recently uploaded (20)

DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
Laughter Yoga Basic Learning Workshop Manual
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Deliverable file - Regulatory guideline analysis.pdf
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PPT
Data mining for business intelligence ch04 sharda
PDF
Business model innovation report 2022.pdf
Euro SEO Services 1st 3 General Updates.docx
Laughter Yoga Basic Learning Workshop Manual
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Business Ethics - An introduction and its overview.pptx
COST SHEET- Tender and Quotation unit 2.pdf
Chapter 5_Foreign Exchange Market in .pdf
Deliverable file - Regulatory guideline analysis.pdf
HR Introduction Slide (1).pptx on hr intro
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Roadmap Map-digital Banking feature MB,IB,AB
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Belch_12e_PPT_Ch18_Accessible_university.pptx
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
unit 1 COST ACCOUNTING AND COST SHEET
Data mining for business intelligence ch04 sharda
Business model innovation report 2022.pdf

Cyber Security: Why your business needs protection & prevention measures

  • 1. Why your business needs prevention & protection measures.
  • 2. [in-fer-mey-shuh n si-kyoo r-i-tee], noun 1. the safeguarding of your organization’s information and information systems from unauthorized access.
  • 3. Loss of confidential information and data breach liability are HUGE RISKS for businesses.
  • 4. When cyber security is not part of your business process, it leaves a company vulnerable to a range of security issues.
  • 5. When cyber security is not part of your business process, it leaves a company vulnerable to a range of security issues. The average cost of data breaches reached over $3.5 MILLION in 2014!
  • 6. Why is it vital in 2015?
  • 9. In 2013: 61% of all targeted attacks were against small and medium sized businesses.
  • 10. In 2013: 61% of all targeted attacks were against small and medium sized businesses. There was a 91% increase in attacks against businesses.
  • 11. In 2013: 61% of all targeted attacks were against small and medium sized businesses. There was a 91% increase in attacks against businesses. There was a 62% increase in the number of breaches.
  • 12. In 2013: 61% of all targeted attacks were against small and medium sized businesses. There was a 91% increase in attacks against businesses. There was a 62% increase in the number of breaches. More than 552 million identities were exposed via breaches.
  • 14. Small business cyber attacks have nearly doubled since 2011!
  • 16. Cyber breaches can extend beyond a company’s firewalls.When this happens, contractors are also included within the realm of risk.
  • 19. What assets are most valuable to the business?
  • 20. What assets are most valuable to the business? Where are these assets supposed to reside and where do they actually reside?
  • 21. Who has access to them and how are they managed? What assets are most valuable to the business? Where are these assets supposed to reside and where do they actually reside?
  • 23. Conduct a cyber vulnerability or penetration test at least once per year.
  • 24. Conduct a cyber vulnerability or penetration test at least once per year. Can any unintended parties access critical assets?
  • 26. Up to 30% of data breaches are due to the operation of a negligent employee or contractor.
  • 28. Accept that security will be compromised.
  • 29. Accept that security will be compromised. Consider “cyber” in all activities.
  • 30. Accept that security will be compromised. Consider “cyber” in all activities. Focus on critical information assets.
  • 31. Accept that security will be compromised. Consider “cyber” in all activities. Focus on critical information assets. Be prepared to respond.
  • 32. Get the basics right. Accept that security will be compromised. Consider “cyber” in all activities. Focus on critical information assets. Be prepared to respond.
  • 33. Chris Roach is Managing Director at CBIZ Risk & Advisory Services. If you have questions about cyber security and what it means to your business, Chris can be reached at croach@cbiz.com. For more information, visit www.cbiz.com/cybersecurity