SlideShare a Scribd company logo
Data security for an SMB
    Fly first class on a budget


    Licensed under the Creative Commons Attribution License
                        Danny Lieberman
                http://www.dannylieberman.info 
    dannyl@controlpolicy.com http://www.controlpolicy.com/ 
                               
“Any large company is made up of a large 
       number of small businesses.”




Bill Gates, circa 1998. 
Explaining why Microsoft workgroup products were a good fit for big enterprises.




                                          
Agenda



•   What threats should concern an SMB?
•   SMB awareness of data security
•   Cultural factors
•   What data should an SMB protect?
•   Is anti-virus enough?
•   Is a firewall enough?
•   Servers in the office or in the cloud?
•   Planning for disasters
•   Fly first class for cheap
                          
•What threats should concern an SMB?




•    Data security is Ugly
       –   Loss of IP
             •   Trusted insider theft
                    –   Mail, Web, IM
                    –   Smart phones
             •   Front-door attacks
                    –   Lost passwords makes it easy
             •   Back-door attacks
                    –   Spyware, Trojans
                    –   Piggy back on legit sessions



                             
•SMB awareness of data security




                                            •   Market research
                                                performed by
                                                Infowatch in
                                                September 09
                                                 – 99% of 190
                                                    SMBs were
                                                    aware of data
                                                    breach issues.
    Infowatch CEO Natalya Kaspersky  
                                                 – Over half
                                                    focused on IP
                                                    protection
                                         
Cultural factors




•   Americans
     –   Rule-based
     –   Technology
     –   Lots of regulation that doesn't work
•   Europeans
     –   Principles-based
     –   Discipline
     –   Regulation that appears to work


                        
•What data should an SMB protect?


•       Credit cards
         –   Usually not an issue for SMB merchants
               •   Most have less than 1 million transactions/year
               •   Most outsource payment processing
               •   Can comply to PCI DSS with a self-assessment


•       Intellectual property
         –   A small firm can have extremely valuable IP
               •   Manufacturer, design house, hi-tech startup
               •   Designs, algorithms,commercial agreements
               •   IP theft can put a SMB out of business




                                         
Is anti-virus enough?




•   The good news
     –   Good AV software can detect and
         prevent certain kinds of attacks that
         steal data
•   The bad news
     –   Anti-virus software is worthless against
         trusted insiders, phishing, man-in-the-
         middle attacks.



                         
Is my firewall enough?




•   There is no good news
     –   Firewall creates false sense of security
     –   Cannot stop trusted insiders
     –   Anyone can violate privacy of other
         employees
     –   Cannot stop targeted Trojans from
         stealing data on open FTP or high-
         numbered ports
           •   If you shut them down, employees will
               take their data home....

                           
In the office or in the cloud?





    Wake up and smell the hummus
     –   Hosting your own mail/Web servers in
         the office is a bad idea
           •   Attracts attackers like flies to honey
     –   Use service like Google Apps
           •   They may read, but they won't steal




                            
Planning for disasters




•   Take regular backups
•   Use a professional hosting service
     –   Calculate cost of loss of business
     –   Spend the right amount
•   Build employee ERT
     –   Emergency response team
     –   Train once every 3 months
     –   Know where the keys are


                         
Fly first class for cheap




    • Policy                • Enforcement




                         
Fly first class for cheap




                         •   Policy: the 10
                             commandments
                             are free.
                         •   An AUP reduces
                               the number of
                               employee
                               options by
                               default
                                –   No “opt-in”
                                    check box
                      
AUP read and understand agreement




An Approved Usage Policy states that:

      “Digital channels are to be used to further the 
      company’s business and improve customer service 
      and not for personal entertainment or gain”

      “Employees will protect the company's digital and 
      physical assets”




                             
Digital Assets




•   Any computerized information that
    the firm uses to compete or
    accomplish it’s missions
     –   Customer pricing
     –   Intellectual property
     –   Biz dev plans




                         
Enforcement




•   Corporate culture
     –   A little fear in the workplace is not a bad idea 
         (Andy Grove)
•   Everyone signs, owner first
•   DLP “Light”
     – Mail and Web
     – Alert and/or block violations
     – SMB solutions available for $10k


                            
DLP “Light” for SMB




    Database    File
     Server    Server




                            Interception

                                SMTP

                                HTTP

                               Policies

                            Alert or Block

                             Reporting

                             Forensics


                         
Coming attractions



Register online for:
• Oct 8: SMB data security
• Oct 15: Data security as a business
   objective
• Oct 22: A holistic approach to security
   and compliance


    http://www.controlpolicy.com/workshops/

                          
Learn more




•   Read the Data Security Blog
    http://www.software.co.il/wordpress/
•   Presentation materials and resources
    http://www.controlpolicy.com/workshops/data-security-workshops/




                              

More Related Content

PDF
Writing An Effective Security Procedure in 2 pages or less and make it stick
PDF
Protecting Data on Laptops
PPTX
Limitations E - Commerce Security measures
PDF
Information Security: A mindset, not a product
PDF
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
PDF
Cyber security and the mainframe (v1.3)
PDF
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
PDF
(2017) GDPR – What Does It Mean For The Mainframe v0.2
Writing An Effective Security Procedure in 2 pages or less and make it stick
Protecting Data on Laptops
Limitations E - Commerce Security measures
Information Security: A mindset, not a product
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
Cyber security and the mainframe (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
(2017) GDPR – What Does It Mean For The Mainframe v0.2

What's hot (17)

PDF
IOT & BYOD – The New Security Risks (v1.1)
PDF
(2017) Cybercrime, Inc. (v3.2)
PDF
Security Audit on the Mainframe (v1.0 - 2016)
PDF
Selling SaaS in a product world
PDF
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
PPTX
Presentation infra and_datacentrre_dialogue_v2
PPTX
Yammer session
PDF
Week 6
PDF
2017 - Data Privacy and GDPR (v1.1)
PDF
Comprehensive Portfolio Management
PPT
Fast-teks Remote Managed Services
PPTX
Webinar: Be Cyber Smart – Stories from the Trenches
PPTX
Selling to The IT Department
PDF
Designing a Base Building Network – The Integrator's Role
PPTX
Introduction presentation
PDF
Security and SMBs
PPTX
Pace IT - Network Devices (part 2)
IOT & BYOD – The New Security Risks (v1.1)
(2017) Cybercrime, Inc. (v3.2)
Security Audit on the Mainframe (v1.0 - 2016)
Selling SaaS in a product world
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
Presentation infra and_datacentrre_dialogue_v2
Yammer session
Week 6
2017 - Data Privacy and GDPR (v1.1)
Comprehensive Portfolio Management
Fast-teks Remote Managed Services
Webinar: Be Cyber Smart – Stories from the Trenches
Selling to The IT Department
Designing a Base Building Network – The Integrator's Role
Introduction presentation
Security and SMBs
Pace IT - Network Devices (part 2)
Ad

Viewers also liked (20)

PPTX
The smb dilemma
PPTX
7 Data Analytics Dashboards for Small Business
PPTX
How Big Data Can Enable Analytics from the Cloud (Technical Workshop)
PDF
Get Featured: So You Want to be on the Front Page of SlideShare?
PDF
The New CSS Layout - dotCSS
PPTX
Holy Crap! You Can Get Fired For Social Media Posts?
PDF
Design in Tech Report 2015
PDF
SpringOwl's 99 Page Presentation On How To Best Turnaround Yahoo!
PPTX
Search Ranking Factors in 2015
PDF
What is strategy?
PDF
Five Tips To Help You Tackle Programming
PDF
State of Startups 2015
PDF
How to build a great coding culture
PDF
Blitzscaling Session 1: Household Stage
PDF
The Real Life Social Network v2
PDF
A Product Manager's Job
PDF
Visualising Data with Code
PDF
Sass Code Reviews - How one code review changed my life #SassConf2015
PDF
Final venture outlook 2016
PDF
2016 A-Z Culture Glossary
The smb dilemma
7 Data Analytics Dashboards for Small Business
How Big Data Can Enable Analytics from the Cloud (Technical Workshop)
Get Featured: So You Want to be on the Front Page of SlideShare?
The New CSS Layout - dotCSS
Holy Crap! You Can Get Fired For Social Media Posts?
Design in Tech Report 2015
SpringOwl's 99 Page Presentation On How To Best Turnaround Yahoo!
Search Ranking Factors in 2015
What is strategy?
Five Tips To Help You Tackle Programming
State of Startups 2015
How to build a great coding culture
Blitzscaling Session 1: Household Stage
The Real Life Social Network v2
A Product Manager's Job
Visualising Data with Code
Sass Code Reviews - How one code review changed my life #SassConf2015
Final venture outlook 2016
2016 A-Z Culture Glossary
Ad

Similar to Data Security For SMB - Fly first class on a budget (20)

PPT
SMBs: The Threat Ahead
PDF
A Guide To SMB Network Security Compliance Research Group(1)
PDF
Security Guide For Small Business
PPTX
Security on a budget
PPTX
Why SMBs Outsource IT to MSPs
PDF
mcafee-10-steps-infographic-d2
PPTX
Data Breach from the Inside Out
PDF
Choosing the Right Data Security Solution
PPTX
2013 PMA Business Security Insights
PDF
White Paper: Mobile Security
PPTX
Continuing Education Conferance
PPTX
Ulf mattsson webinar jun 7 2012 slideshare version
PDF
"Thinking diffrent" about your information security strategy
PPTX
Information Security For Small Business
PDF
Small Business Technology Challenges
PDF
Ten Top Tips on Keeping Your Business Secure
PDF
Ten top tips on keeping your business secure
PPTX
ISACA New York Metro April 30 2012
PDF
SYMCAnnual
PDF
Homeland Security - strengthening the weakest link
SMBs: The Threat Ahead
A Guide To SMB Network Security Compliance Research Group(1)
Security Guide For Small Business
Security on a budget
Why SMBs Outsource IT to MSPs
mcafee-10-steps-infographic-d2
Data Breach from the Inside Out
Choosing the Right Data Security Solution
2013 PMA Business Security Insights
White Paper: Mobile Security
Continuing Education Conferance
Ulf mattsson webinar jun 7 2012 slideshare version
"Thinking diffrent" about your information security strategy
Information Security For Small Business
Small Business Technology Challenges
Ten Top Tips on Keeping Your Business Secure
Ten top tips on keeping your business secure
ISACA New York Metro April 30 2012
SYMCAnnual
Homeland Security - strengthening the weakest link

More from Flaskdata.io (17)

PDF
Flaskdata - Observability for clinical data
PDF
The travel industry does real-time. Why doesn't clinical research?
PDF
Flaskdata.io automated monitoring for clinical trials
PPTX
How to write secure code
PDF
The insights that will help your medtech clinical trial succeed
PDF
2017 02-05 en-eu-data-security_v2
PPTX
Quick user guide to the Clear Clinica Cloud EDC system
PPTX
Killed by code 2015
PPTX
Killed by code 2015
PPTX
Pathcare: Patient-issue oriented healthcare
PPTX
The Tao of GRC
PDF
Will Web 2.0 applications break the cloud?
PPTX
Killed by code - mobile medical devices
PPTX
Grc tao.4
PPT
Data Security For Compliance 2
PDF
Data Security Metricsa Value Based Approach
PDF
Selling Data Security Technology
Flaskdata - Observability for clinical data
The travel industry does real-time. Why doesn't clinical research?
Flaskdata.io automated monitoring for clinical trials
How to write secure code
The insights that will help your medtech clinical trial succeed
2017 02-05 en-eu-data-security_v2
Quick user guide to the Clear Clinica Cloud EDC system
Killed by code 2015
Killed by code 2015
Pathcare: Patient-issue oriented healthcare
The Tao of GRC
Will Web 2.0 applications break the cloud?
Killed by code - mobile medical devices
Grc tao.4
Data Security For Compliance 2
Data Security Metricsa Value Based Approach
Selling Data Security Technology

Data Security For SMB - Fly first class on a budget

  • 1. Data security for an SMB Fly first class on a budget Licensed under the Creative Commons Attribution License Danny Lieberman http://www.dannylieberman.info  dannyl@controlpolicy.com http://www.controlpolicy.com/     
  • 2. “Any large company is made up of a large  number of small businesses.” Bill Gates, circa 1998.  Explaining why Microsoft workgroup products were a good fit for big enterprises.    
  • 3. Agenda • What threats should concern an SMB? • SMB awareness of data security • Cultural factors • What data should an SMB protect? • Is anti-virus enough? • Is a firewall enough? • Servers in the office or in the cloud? • Planning for disasters • Fly first class for cheap    
  • 4. •What threats should concern an SMB? • Data security is Ugly – Loss of IP • Trusted insider theft – Mail, Web, IM – Smart phones • Front-door attacks – Lost passwords makes it easy • Back-door attacks – Spyware, Trojans – Piggy back on legit sessions    
  • 5. •SMB awareness of data security • Market research performed by Infowatch in September 09 – 99% of 190 SMBs were aware of data breach issues. Infowatch CEO Natalya Kaspersky   – Over half focused on IP protection    
  • 6. Cultural factors • Americans – Rule-based – Technology – Lots of regulation that doesn't work • Europeans – Principles-based – Discipline – Regulation that appears to work    
  • 7. •What data should an SMB protect? • Credit cards – Usually not an issue for SMB merchants • Most have less than 1 million transactions/year • Most outsource payment processing • Can comply to PCI DSS with a self-assessment • Intellectual property – A small firm can have extremely valuable IP • Manufacturer, design house, hi-tech startup • Designs, algorithms,commercial agreements • IP theft can put a SMB out of business    
  • 8. Is anti-virus enough? • The good news – Good AV software can detect and prevent certain kinds of attacks that steal data • The bad news – Anti-virus software is worthless against trusted insiders, phishing, man-in-the- middle attacks.    
  • 9. Is my firewall enough? • There is no good news – Firewall creates false sense of security – Cannot stop trusted insiders – Anyone can violate privacy of other employees – Cannot stop targeted Trojans from stealing data on open FTP or high- numbered ports • If you shut them down, employees will take their data home....    
  • 10. In the office or in the cloud?  Wake up and smell the hummus – Hosting your own mail/Web servers in the office is a bad idea • Attracts attackers like flies to honey – Use service like Google Apps • They may read, but they won't steal    
  • 11. Planning for disasters • Take regular backups • Use a professional hosting service – Calculate cost of loss of business – Spend the right amount • Build employee ERT – Emergency response team – Train once every 3 months – Know where the keys are    
  • 12. Fly first class for cheap • Policy • Enforcement    
  • 13. Fly first class for cheap • Policy: the 10 commandments are free. • An AUP reduces the number of employee options by default – No “opt-in” check box    
  • 14. AUP read and understand agreement An Approved Usage Policy states that:  “Digital channels are to be used to further the  company’s business and improve customer service  and not for personal entertainment or gain”  “Employees will protect the company's digital and  physical assets”    
  • 15. Digital Assets • Any computerized information that the firm uses to compete or accomplish it’s missions – Customer pricing – Intellectual property – Biz dev plans    
  • 16. Enforcement • Corporate culture – A little fear in the workplace is not a bad idea  (Andy Grove) • Everyone signs, owner first • DLP “Light” – Mail and Web – Alert and/or block violations – SMB solutions available for $10k    
  • 17. DLP “Light” for SMB Database File Server Server Interception SMTP HTTP Policies Alert or Block Reporting Forensics    
  • 18. Coming attractions Register online for: • Oct 8: SMB data security • Oct 15: Data security as a business objective • Oct 22: A holistic approach to security and compliance http://www.controlpolicy.com/workshops/    
  • 19. Learn more • Read the Data Security Blog http://www.software.co.il/wordpress/ • Presentation materials and resources http://www.controlpolicy.com/workshops/data-security-workshops/