SlideShare a Scribd company logo
Information Security For Small Businessby Julius Clark Sr.,  MBA, CISSP, CISA
About MeBDPA History2010-2012	Charlotte President2010-2012	National BDPA CISO2007-2009 	Charlotte President-Elect2006-2004	VP of SITES (Education)2001-2003	Charlotte  HSCC  CoordinatorEducationMBA in Information SecuritySalem International University, Salem, WVMSIS in Information SecurityUniversity of Fairfax, Fairfax, VABS in Electronic EngineeringWentworth Institute of Technology, Boston, MACertificationsCertified Information Systems Security Professional (CISSP)
Certified Information Systems Auditor (CISA)
Microsoft Certified System Engineer (MSCE).Julius Clark Sr.Location: Charlotte, NCCurrent home, been residing in Charlotte, NC for over 10 yearsHometownBoston, MaProfessionInformation Security Professional.2
AgendaInformation Security for Small Business3
Agenda  (Continued)Information Security for Small Business4
IT Security &Business Wholeness5
Maslow’s Hierarchy of NeedsBeing aware of one’s Wholeness keeps bad things from happening.  A solid foundation must be built to advance. Understanding your environment, your health and activities helps one to continually perform risk assessments and move to the next level.Self – Actualization – Being All You Can Be
Esteem -  Recognition for Good Work
Love -  Acceptance
Safety & Security – Stability
Needs – Air , Food, Water, Shelter6
Maslow’s Business ComparisonMaslow’s Hierarchy of Needs can be applied to building a successful business. IT Security is a foundation that businesses must build upon to lower IT Security risks, which can help your business gain a competitive edge.Self – Actualization – Meeting the Mission Statement
Esteem -  Recognition in Market Place
Love -  Acceptance by Clients or Customers
Safety & Security –  IT Security & Insurance
Needs – Capital & People7
Importance of Small BusinessesStatistic:There are over 26 million small businesses in the U.S.Source: NIST8
What Is At Stake?Your Business! Your business is at risk of being damaged due to:Financial loss
Lawsuits
Reputation loss
loss of market share
Theft of its technology , resources and products
Denial of service attacks
Blackmail9
What is Information Security?10
What Is Information Security?Protecting your information, technology, property, products and people; all vital business assets. The Information Security Triad is the foundation for  Information Security and is based on concepts and principles known as  CIA.Confidentiality
Integrity
Availability11
What Is Information Security?ConfidentialityConcept of protecting information from improper disclosure and protecting the secrecy and privacy of sensitive data so that the intellectual property and reputation of an organization  is not damaged and that data related to individuals is not released in violation of regulations or the privacy policy of the organization.- From the CISSP® CBK®12
What Is Information Security?IntegrityAddresses two objects, which are protecting data and processes from improper modification, and ensuring the operations of the information is reliable and performing as expected.- From the CISSP® CBK®13
What Is Information Security?AvailabilityThe concept of ensuring that the systems and data can be accessed when required. Availability is impacted by human error, cabling problems, software bug, hardware failures, loss of skilled staff, malicious code, and the many other threats that can render a system un-usable or unreliable. - From the CISSP® CBK®:14
Components of information security architecture 15
Components of Information Security ArchitectureThe process of instituting a complete information security solution to the architecture of a business, ensuring the security of business information at every point in the architecture. People
Processes
Technology16
Components of Information Security ArchitecturePeoplePeople are the weakest link of a business’ process. You all know why!17
Components of Information Security ArchitectureProcessesThe operational aspects of small business. Safeguards can be automated or manual. 18
Components of Information Security ArchitectureTechnologyAll of the tools, applications, software, and infrastructure that allows a business process to work and perform efficiently. Thus as a business owner you must ensure that you have adequate logical controls in place to help you stay on track with your business’ mission or purpose.19
Cyber Crime In the news20
Who Are The Actors?Their Roles:Experimenters
Hacktivists
Cyber criminals
Information Warriors
Employees
Dumpster divers
Natural disasters
Terrorist activities21
Who Are The Actors?Malicious Code!Key loggers – Stealing your keystrokes
Viruses
Denial of service
Turning your computer into a zombie aka “Bot”22
Cyber Crime In the News23
Cyber Crime Statistics!Insider threats are responsible for over 80% of small business issues.There are over 70,000 active viruses ; and exponentially growingInformation Security threats can damage or destroy small business33%  of businesses with 100 employees or less had a computer incidentSource: NIST24
Cyber Crime Statistics!Small Business Cyber Crime Report42 %  of businesses had a Laptop theft44%  of businesses suffered from Insider Abuse21% of businesses reported Denial of Service50%  of businesses detected a viruses20%  of business systems became a “Bot”Source: Computer Security Institute Survey25
Cyber Crime Statistics!Reported Data Breaches2007  - there were 445 data breaches reported 2008 – there were 656 data breaches reported2009 – approx. 392 data breaches reported.Source: October 9, 2009 USAToday 26
27Chronology of Data Breacheswww.privacyrights.org
28Chronology of Data Breacheswww.privacyrights.orgThe 354,537,108 indicates the total number of records compromised

More Related Content

PDF
Cybersecurity Employee Training
PPTX
Information security awareness - 101
PDF
End-User Security Awareness
PDF
Information Security Awareness for everyone
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PDF
Insider threat
PPTX
Information Security Awareness Training Open
PPT
New Hire Information Security Awareness
Cybersecurity Employee Training
Information security awareness - 101
End-User Security Awareness
Information Security Awareness for everyone
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Insider threat
Information Security Awareness Training Open
New Hire Information Security Awareness

What's hot (20)

PPTX
Cybersecurity Awareness Training
PPTX
ICT and end user security awareness slides
PPTX
Cybersecurity
PDF
IT Security - Guidelines
PPTX
Awareness Training on Information Security
PDF
Security Awareness Training
PDF
Employee Security Awareness Program
PPTX
User security awareness
PDF
Cyber Security Awareness Training
PPTX
Hyphenet Security Awareness Training
PPTX
Security awareness
PPSX
Security Awareness Training
PDF
Information Security Awareness Training
PDF
Cyber Security Awareness
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPSX
Cyber crimes (By Mohammad Ahmed)
PDF
Cybersecurity Awareness Training Presentation v2024.03
PPTX
Information Security Governance and Strategy
PPTX
Cybersecurity Awareness
Cybersecurity Awareness Training
ICT and end user security awareness slides
Cybersecurity
IT Security - Guidelines
Awareness Training on Information Security
Security Awareness Training
Employee Security Awareness Program
User security awareness
Cyber Security Awareness Training
Hyphenet Security Awareness Training
Security awareness
Security Awareness Training
Information Security Awareness Training
Cyber Security Awareness
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cyber crimes (By Mohammad Ahmed)
Cybersecurity Awareness Training Presentation v2024.03
Information Security Governance and Strategy
Cybersecurity Awareness
Ad

Viewers also liked (20)

PDF
Small Business Guide to Information Security
PPTX
Business information security requirements
PDF
Information security
PPTX
Itinerario político cultural de la españa actual-carlos pla barriol
PDF
Zombis
PDF
2 cell smart power selector 1760fa 1
PDF
Hack x crack_scapy2
PDF
Nueva Carta de El Pote Restaurante
PPT
El pendo
PPTX
"Как продавать Вену": вебинар Vitiana
DOCX
Sanjay Singh Nayal-CV
KEY
Introduction to Free Software
PDF
BüroWARE Oil - ERP-Software für den Energiehandel
PDF
Lourdes Flores Y CéSar CatañO
PDF
Ieee projects 2012 2013 - Mobile Computing
DOCX
Newsletter iii2016
PDF
Content Marketing: Wie kann Ihr Business davon profitieren?
PPTX
April 2015 group advisement
PPTX
Biografía del dr. alfonso millán maldonado (27/ago/2013)
PDF
Tema2 químicainorgánicaa 2011
Small Business Guide to Information Security
Business information security requirements
Information security
Itinerario político cultural de la españa actual-carlos pla barriol
Zombis
2 cell smart power selector 1760fa 1
Hack x crack_scapy2
Nueva Carta de El Pote Restaurante
El pendo
"Как продавать Вену": вебинар Vitiana
Sanjay Singh Nayal-CV
Introduction to Free Software
BüroWARE Oil - ERP-Software für den Energiehandel
Lourdes Flores Y CéSar CatañO
Ieee projects 2012 2013 - Mobile Computing
Newsletter iii2016
Content Marketing: Wie kann Ihr Business davon profitieren?
April 2015 group advisement
Biografía del dr. alfonso millán maldonado (27/ago/2013)
Tema2 químicainorgánicaa 2011
Ad

Similar to Information security for small business (20)

PPTX
Information Security For Small Business
PDF
Information Security for Small Business
PDF
Information Security for Small Business
PDF
Cyber security do your part be the resistance
PDF
BIZGrowth Strategies — Cybersecurity Special Edition 2023
PPT
Security analysis
PPTX
Cyber Security for the Small Business Experience
PDF
CCA study group
PPTX
Security Best Practices for Small Business
PDF
Business Intelligence and Data Security for Long-Term Care Financial Professi...
PDF
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
PDF
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
PDF
Netwealth educational webinar: Peace of mind in a digital world
PDF
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
PPT
Information security management v2010
PDF
Cybersecurity- What Retailers Need To Know
PPTX
Cyber Security and the CEO
PDF
McNair_Paper_Hill
PPTX
Symantec Data Loss Prevention 9
Information Security For Small Business
Information Security for Small Business
Information Security for Small Business
Cyber security do your part be the resistance
BIZGrowth Strategies — Cybersecurity Special Edition 2023
Security analysis
Cyber Security for the Small Business Experience
CCA study group
Security Best Practices for Small Business
Business Intelligence and Data Security for Long-Term Care Financial Professi...
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Netwealth educational webinar: Peace of mind in a digital world
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Information security management v2010
Cybersecurity- What Retailers Need To Know
Cyber Security and the CEO
McNair_Paper_Hill
Symantec Data Loss Prevention 9

More from BDPA Charlotte - Information Technology Thought Leaders (10)

DOC
2011 BDPA Charlotte Membership Packet
PDF
Mastering linkedIn Advanced Techniques and Insider Secrets BDPA National Pres...
PPTX
DOC
PDF
Health Information Technology Workforce Development Program Presentation
PPT
How to Create a Business Plan by SCORE
PPT
How to Start a Small IT Consulting Firm
PPTX
BDPA Charlotte Information Technology Thought Leaders 2010 Membership Drive
2011 BDPA Charlotte Membership Packet
Mastering linkedIn Advanced Techniques and Insider Secrets BDPA National Pres...
Health Information Technology Workforce Development Program Presentation
How to Create a Business Plan by SCORE
How to Start a Small IT Consulting Firm
BDPA Charlotte Information Technology Thought Leaders 2010 Membership Drive

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
KodekX | Application Modernization Development
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KodekX | Application Modernization Development
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.

Information security for small business

  • 1. Information Security For Small Businessby Julius Clark Sr., MBA, CISSP, CISA
  • 2. About MeBDPA History2010-2012 Charlotte President2010-2012 National BDPA CISO2007-2009 Charlotte President-Elect2006-2004 VP of SITES (Education)2001-2003 Charlotte HSCC CoordinatorEducationMBA in Information SecuritySalem International University, Salem, WVMSIS in Information SecurityUniversity of Fairfax, Fairfax, VABS in Electronic EngineeringWentworth Institute of Technology, Boston, MACertificationsCertified Information Systems Security Professional (CISSP)
  • 4. Microsoft Certified System Engineer (MSCE).Julius Clark Sr.Location: Charlotte, NCCurrent home, been residing in Charlotte, NC for over 10 yearsHometownBoston, MaProfessionInformation Security Professional.2
  • 6. Agenda (Continued)Information Security for Small Business4
  • 8. Maslow’s Hierarchy of NeedsBeing aware of one’s Wholeness keeps bad things from happening. A solid foundation must be built to advance. Understanding your environment, your health and activities helps one to continually perform risk assessments and move to the next level.Self – Actualization – Being All You Can Be
  • 9. Esteem - Recognition for Good Work
  • 10. Love - Acceptance
  • 11. Safety & Security – Stability
  • 12. Needs – Air , Food, Water, Shelter6
  • 13. Maslow’s Business ComparisonMaslow’s Hierarchy of Needs can be applied to building a successful business. IT Security is a foundation that businesses must build upon to lower IT Security risks, which can help your business gain a competitive edge.Self – Actualization – Meeting the Mission Statement
  • 14. Esteem - Recognition in Market Place
  • 15. Love - Acceptance by Clients or Customers
  • 16. Safety & Security – IT Security & Insurance
  • 17. Needs – Capital & People7
  • 18. Importance of Small BusinessesStatistic:There are over 26 million small businesses in the U.S.Source: NIST8
  • 19. What Is At Stake?Your Business! Your business is at risk of being damaged due to:Financial loss
  • 23. Theft of its technology , resources and products
  • 26. What is Information Security?10
  • 27. What Is Information Security?Protecting your information, technology, property, products and people; all vital business assets. The Information Security Triad is the foundation for Information Security and is based on concepts and principles known as CIA.Confidentiality
  • 30. What Is Information Security?ConfidentialityConcept of protecting information from improper disclosure and protecting the secrecy and privacy of sensitive data so that the intellectual property and reputation of an organization is not damaged and that data related to individuals is not released in violation of regulations or the privacy policy of the organization.- From the CISSP® CBK®12
  • 31. What Is Information Security?IntegrityAddresses two objects, which are protecting data and processes from improper modification, and ensuring the operations of the information is reliable and performing as expected.- From the CISSP® CBK®13
  • 32. What Is Information Security?AvailabilityThe concept of ensuring that the systems and data can be accessed when required. Availability is impacted by human error, cabling problems, software bug, hardware failures, loss of skilled staff, malicious code, and the many other threats that can render a system un-usable or unreliable. - From the CISSP® CBK®:14
  • 33. Components of information security architecture 15
  • 34. Components of Information Security ArchitectureThe process of instituting a complete information security solution to the architecture of a business, ensuring the security of business information at every point in the architecture. People
  • 37. Components of Information Security ArchitecturePeoplePeople are the weakest link of a business’ process. You all know why!17
  • 38. Components of Information Security ArchitectureProcessesThe operational aspects of small business. Safeguards can be automated or manual. 18
  • 39. Components of Information Security ArchitectureTechnologyAll of the tools, applications, software, and infrastructure that allows a business process to work and perform efficiently. Thus as a business owner you must ensure that you have adequate logical controls in place to help you stay on track with your business’ mission or purpose.19
  • 40. Cyber Crime In the news20
  • 41. Who Are The Actors?Their Roles:Experimenters
  • 49. Who Are The Actors?Malicious Code!Key loggers – Stealing your keystrokes
  • 52. Turning your computer into a zombie aka “Bot”22
  • 53. Cyber Crime In the News23
  • 54. Cyber Crime Statistics!Insider threats are responsible for over 80% of small business issues.There are over 70,000 active viruses ; and exponentially growingInformation Security threats can damage or destroy small business33% of businesses with 100 employees or less had a computer incidentSource: NIST24
  • 55. Cyber Crime Statistics!Small Business Cyber Crime Report42 % of businesses had a Laptop theft44% of businesses suffered from Insider Abuse21% of businesses reported Denial of Service50% of businesses detected a viruses20% of business systems became a “Bot”Source: Computer Security Institute Survey25
  • 56. Cyber Crime Statistics!Reported Data Breaches2007 - there were 445 data breaches reported 2008 – there were 656 data breaches reported2009 – approx. 392 data breaches reported.Source: October 9, 2009 USAToday 26
  • 57. 27Chronology of Data Breacheswww.privacyrights.org
  • 58. 28Chronology of Data Breacheswww.privacyrights.orgThe 354,537,108 indicates the total number of records compromised
  • 59. Business Continuity and Disaster Recovery Planning29
  • 60. Business Continuity & Disaster Recovery PlanningNIST IT Security Fundamentals For Small BusinessContingency and Disaster Recover planning considerations What happens if there is a disaster (flood, fire, tornado, etc) or a contingency (power outage, sewer backup, accidental sprinkler activation, etc)? Do you have a plan for restoring business operations during or after a disaster or a contingency? Since we all experience power outages or brownouts from time to time, do you have Uninterruptible Power Supplies (UPS) on each of your computers and critical network components? They allow you to work through short power outages and to save your data when the electricity goes off. Conduct an inventory of all information used in running your business. Do you know where each type of information is located (on which computer or server)? Have you prioritized your business information so that you know which type of information is most critical to the operation of your business – and, therefore, which type of information must be restored first in order to run your most critical operations?If you have never (or not recently) done a full inventory of your important business information, now is the time. For a small business, this shouldn’t take longer than a few hours. For a larger business, this might take from a day to a week or so. While you are doing this inventory, ensure that the information is prioritized relative to importance for the entire business, not necessarily for a single part of the business. When you have your prioritized information inventory (on an electronic spreadsheet), add three columns to address the kind of protection that each type of information needs. Some information will need protection for confidentiality, some for integrity, and some for availability. 30
  • 65. Actions for The Business Owner To Take35Identify what threats are a danger to your business? Many threats are found in a specific geographic area – what is a common threat in your area?
  • 66. As you read/research your trade/professional publications, take note of the data security issues covered in these publications. Ask yourself “Is my business vulnerable to something like this? If so, what have others done that I could copy to protect my business?”
  • 67. As you network with your peers, talk cyber security issues. Give and get advice, hints, tips, etc.
  • 68. Make every effort to stay in touch with and on top of every threat or incident that does or could affect your business.
  • 69. Join InfraGard to get critical information about current threats in your local area (and to act as eyes and ears to help protect our nation!).
  • 70. (www.infragard.net - membership application form is online – membership is free in most areas of our nation)Safeguarding critical assets36
  • 71. Safeguarding Critical AssetsThe “Absolutely Necessary” actions that a small business should take to protect its information, systems, and networks. People
  • 74. Safeguarding Critical AssetsPeoplePeople are the weakest link of the three components of Information Security!38
  • 75. Safeguarding Critical AssetsPeopleControl physical access to your computers and network hardwareDo not allow unauthorized persons to have physical access to any of your business PCs.
  • 76. Lock up laptops when they are not in use.
  • 77. Control who has access to your systems and networks, this includes cleaning crews. No one should be able to walk into your office space without being challenged by an employee.
  • 78. Vendors and service persons should provide appropriate identification.Limit employee access to data and information, and limit authority to install software.Employees should not install unauthorized software .
  • 79. Do not provide access to all data to any employee,
  • 80. Only give employee enough access privileges necessary to perform job.
  • 81. Do not allow a single individual to both initiate and approve a transaction (financial or otherwise).39
  • 82. Safeguarding Critical AssetsProcessesThe operational aspects of small business; needs checks and balances aka controls.40
  • 83. Safeguarding Critical AssetsProcessesBackup important business data and information.Recommended to be done automatically.
  • 84. Backups can be done inexpensively if copied to another hard drive that can hold 52 weeks of backups; 500GB should be sufficient for most businesses.
  • 85. Consider cloud/ online backup solutions; convenient but slow to restore.
  • 86. Backups should be performed at a minimum weekly, but better if done daily.
  • 87. A full backup should be performed once a month and taken off site incase of a fire, flood, theft or other disaster.
  • 88. Portable USB Drive is recommended ; 1 TB
  • 89. Regularly test your backup data.Train your employees on basic security principlesEmployees using any programs containing sensitive information should be trained on how to properly protect it.
  • 90. Employees should review computer usage policies on the 1st day of work.
  • 91. Train them about expectations concerning limited use of telephones, printers and other business resources.
  • 92. After training they should sign a a statement that they understand these policies and the penalties for violation of business policies.41
  • 93. Safeguarding Critical AssetsProcessesRequires individual user accounts for each employee on business computers and for business applications.Create an account for all individual users and require strong passwords consisting of 8-10 characters in length, made up of random letters, numbers and special characters.
  • 94. To protect information and systems, employees should not operate computers with administrative privileges.
  • 95. Malicious code will gain the same privileges and install itself on a system if the user is using an account with administrative privileges.
  • 96. Password should never be shared and changed every 3 months.Train your employees on basic security principlesEmployees using any programs containing sensitive information should be trained on how to properly protect it.
  • 97. Employees should review computer usage policies on the 1st day of work..
  • 98. Train them about expectations concerning limited use of telephones, printers and other business resources.
  • 99. After training they should sign a a statement that they understand these policies and the penalties for violation of business policies. 42
  • 100. Safeguarding Critical AssetsTechnologyProtect information, systems, networks from damage by viruses, spyware, and other malicious codeInstall anti-virus software & anti-spyware software on all computer systems.
  • 101. It is recommended to have the anti-virus software, spyware and malicious code software to update automatically; frequently.
  • 102. Obtain copies for employees home computers.Provide security for your internet connection(s)Install operational firewall between your internal network and the Internet.
  • 103. Ensure that your employees home PCs have a firewall installed between your/ their systems(s) and the Internet.
  • 104. Change the administrative password upon installation and regularly thereafter. Good idea to change the administrator name too.43
  • 105. Safeguarding Critical AssetsTechnologySecure your wireless access points and networks.Change default administrator password.
  • 106. Set wireless device to not broadcast its Service Set Identifier (SSID).
  • 107. Recommended encryption is WiFi Protected Access 2 (WPA-2) using Advanced Encryption Standard (AES).
  • 108. NOTE: WEP (Wired-Equivalent Privacy) is not a good wireless security protocol.
  • 109. It is recommended to configure Desktop / Server Operating systems to update automatically. 44
  • 110. Safeguarding Critical AssetsTechnologyInstall and activate software firewalls on all of your business systems.If you use Microsoft Windows XP or higher it will have a firewall included.
  • 111. Make sure that the firewall is turned on.
  • 112. Ensure that your employees home PCs have a firewall and turned on as well.Patch your operating systems and applications.Microsoft releases new patches on the second Tuesday of each month; sooner for serious threats.
  • 113. It is recommended to configure systems to update automatically.
  • 114. Ensure employees home PCs are configured to update automatically as well.
  • 115. If you have many systems consider purchasing a product that can manage the process for your business.
  • 116. Update Microsoft Office regularly. 45
  • 118. 47Highly Recommended IT Security Practices!Business Policies Should Be In PlaceEvery business needs written policies to identify acceptable practices and expectations for business operations. Some policies will be related to human resources.
  • 119. Some will relate to expected employee practices for using business resources, such as telephones, computers, printers, fax machines, and Internet access.
  • 120. Legal and regulatory requirements may also require certain policies to be put in place and enforced.
  • 121. Policies for information, computer, network, and Internet security, should communicate clearly to employees the expectations that the business management has for appropriate use. 48Highly Recommended IT Security Practices!Business Policies Should Be In PlaceThese policies should identify information and other resources which are important to management and should clearly describe how management expects those resources to be used and protected by all employees.
  • 122. Policies should be communicated clearly to each employee and all employees should sign a statement agreeing that they have read the policies, that they will follow the policies, and that they understand the possible penalties for violating those policies.
  • 123. This will help management to hold employees accountable for violation of the businesses policies.
  • 124. There should be penalties for disregarding business policies, andthose penalties should be enforced fairly and consistently for everyone in the business. Highly Recommended IT Security Practices!Business Policies Should Be In PlaceSecurity emails requesting sensitive information.  Security concerns about email attachments and emails requesting sensitive information. Do not open email attachments unless you are expecting the email with the attachment and you trust the sender. If you are not sure why someone sent you an email with attachments or links. Call them or email them back asking questions.Be cautious of emails asking for sensitive personal or financial information – regardless of who the email appears to be from. No responsible business will ask for sensitive information in an email.  Security concerns about web links in email, instant messages, social media, or other means.  Do not click on links in email messages. Recently, scams are in the form of embedded links in emails. Once a recipient clicks on the link, malicious software (for example, key stroke logging software) is installed on the user’s computer. Don’t do it unless you know what the web link connects to and you trust the person who sent the email to you. 49
  • 125. Highly Recommended IT Security Practices!Business Policies Should Be In PlaceSecurity concerns about popup windows and other hacker tricks.  When connected to and using the Internet, do not respond to popup windows requesting that you to click “ok” for anything.  If a window pops up on your screen informing you that you have a virus or spyware and suggesting that you download an antivirus or antispyware program to take care of it, close the popup window by selecting the X in the upper right corner of the popup window.  Hackers are known to scatter infected USB drives with provocative labels in public places where their target business’s employees hang out, knowing that curious individuals will pick them up and take them back to their office system to “see what’s on them.” What is on them is generally malicious code which installs a spy program or remote control program on the computer. Teach your employees to not bring USB drives into the office and plug them into your business computers (or take them home and plug into their home systems). It is a good idea to disable the “AutoRun” feature for the USB ports on your business computers to help prevent such malicious programs from running.50
  • 126. Highly Recommended IT Security Practices!Business Policies Should Be In PlaceSecurity considerations for web surfing. No one should surf the web using a user account which has administrative privileges. It is best to set up a special account with “guest” (limited) privileges to avoid this vulnerability. Issues in downloading software from the Internet. Do not download software from any unknown web page. Only those web pages belonging to businesses with which you have a trusted business relationship should be considered reasonably safe for downloading software. Such trusted sites would include the Microsoft Update web page where you would get patches and updates for various versions of the Windows operating system and Microsoft Office or other similar software. Most other web pages should be viewed with suspicion. Be very careful if you decide to use freeware or shareware from a source on the web. Most of these do not come with technical support and some are deliberately crippled so that you do not have the full functionality you might be led to believe will be provided. 51
  • 127. Highly Recommended IT Security Practices!Business Policies Should Be In PlaceDoing online business or banking more securely. Online business/commerce/banking should only be done using a secure browser connection. This will normally be indicated by a small lock visible in the lower right corner of your web browser window. After any online commerce or banking session, erase your web browser cache, temporary internet files, cookies, and history so that if your system is compromised, that information will not be on your system to be stolen by the individual hacker or malware program.  Recommended personnel practices in hiring employees.  When hiring new employees, conduct a comprehensive background check before making a job offer. Ensure that you do criminal background checks on all prospective new employees. If possible, it is a good idea to do a credit check on prospective employees. This is especially true if they will be handling your business funds. Do your homework – call their references and former employers. Note: It is also an excellent idea for you the business owner to do a background check of yourself. Many people become aware that they are victims of identity theft only after they do a background check on themselves and find arrest records and unusual previous addresses where they never lived. 52
  • 128. Highly Recommended IT Security Practices!Business Policies Should Be In PlaceHow to protect against Social Engineering.Social engineering is a personal or electronic attempt to obtain unauthorized information or access to systems/facilities or sensitive areas by manipulating people. The social engineer researches the organization to learn names, titles, responsibilities, and publically available personal identification information. Then the social engineer usually calls the organization’s receptionist or help desk with a believable, but made-up story designed to convince the person that the social engineer is someone in, or associated with, the organization and needs information or system access which the organization’s employee can provide and will feel obligated to provide.  Train employees to protect against social engineering techniques, employees must be taught to be helpful, but vigilant when someone calls in for help and asks for information or special system access. The employee must first authenticate the caller by asking for identification information that only the person who is in or associated with the organization would know.  If the individual is not able to provide such information, then the employee should politely, but firmly refuse to provide what has been requested by the social engineer. The employee should then notify management of the attempt to obtain information or system access. 53
  • 129. How to dispose of old computers and media.  When disposing of old business computers, remove the hard disks and destroy them. The destruction can be done by taking apart the disk and beating the hard disk platters with a hammer. It is very common for small businesses to discard old computers and media without destroying the computers’ hard disks or the media. Sensitive business and personal information is regularly found on computers purchased on Ebay, thrift shops, Goodwill, etc, much to the embarrassment of the small businesses involved (and much to the annoyance of customers or employees whose sensitive data is compromised). Consider Using Full Disk Encryption if you handle sensitive data and information.54Highly Recommended IT Security Practices!NIST IT Security Fundamentals For Small Business
  • 130. Information Security Resources for Small BusinessSmall Business Information Security : The Fundamentals (Security Guide for Small Business)http://csrc.nist.gov/publications/drafts/ir-7621/draft-nistir-7621.pdfSmall Business Center Documentshttp://csrc.nist.gov/groups/SMA/sbc/library.htmlInfraGard – FBI Sponsored Cyber Security Programhttp://www.infragard.netProtecting Personal informationwww.ftc.gov/infosecurityComputer Security Training, Network Research & Resourceswww.SANS.orgOn Guard Online - Protect Your Personal Informationhttp://www.onguardonline.gov/55
  • 131. Closing RemarksRemember the IT Security Triad!The Information Security Triad is the foundation for Information Security and is based on concepts and principles known as CIA.Confidentiality
  • 134.    References   57Surviving Security—How to Integrate People, Process and Technology, 2nd Editionhttp://www.isaca.org/Template.cfm?Section=Home&CONTENTID=27320&TEMPLATE=/ContentManagement/ContentDisplay.cfmIntroduction to the Business Model for Information Security , 2009 ISACAhttp://www.isaca.orgSmall Business Information Security : The Fundamentals (Security Guide for Small Business)http://www.nist.gov/cgi-bin//get_pdf.cgi?pub_id=903080Small Business Center Documentshttp://csrc.nist.gov/groups/SMA/sbc/library.htmlInterHack,- Information Security: Friend or Foe, 2002http://web.interhack.com/publications/whatis-security.pdf
  • 135. 58Contact InformationJulius ClarkEmail: Julius.Clark.Sr@gmail.comTel: 704-953-379Blog:www.clarkthoughtleadership.blogspot.com