SlideShare a Scribd company logo
Network Security 
Josh Dean 
Director of IT 
jdean@opswat.com 
October 2014
Network Security - 1990’s 
 Basic and default security settings were 
utilized 
 Only one antivirus program was usually 
installed on devices 
 Very rudimentary security measures were in 
place 
 Didn’t have to worry about cellphones or 
tablets 
Network Security Then and Now 
Back in the Day….
Network Security - 2014 
 Cyber-attacks are more sophisticated and 
targeted 
 Every machine must be secured and 
hardened to combat complex forms of 
malware 
 Rise in BYOD further complicates the 
issue for network administrators 
 Data breaches are costing companies 
100’s of millions of dollars 
Network Security Then and Now 
What is the Security Environment like Now?
 Create complex passwords using numbers 
and symbols 
 Never use any security questions that can be 
found on your social media accounts 
 Lock your device at all times! 
What We Can Do to Help 
Don’t Make Yourself a Target 
What Can We Do To Protect Ourselves?
What Can We Do To Protect Ourselves? 
 Report stolen items immediately 
 Have a “brick my device” application 
What We Can Do to Help 
Don’t Make Yourself a Target 
 Never make pin numbers out of any of your personal 
identifiable information 
 Don’t let anyone unfamiliar near computers unattended
What Your Business is Doing for You… 
Protecting You and Your Data from Threats 
Protecting Your Data 
 Multi-tiered Strategy 
 Systems have centrally managed security 
applications in place 
 Servers are hardened, and additional 
measures are taken to secure the data 
 Next-gen equipment can shut down threats 
as they happen 
 Networking devices are able to examine 
potential threats in real-time
Protecting Your Data 
 High-end networking equipment can shut 
down nodes automatically to contain and 
quarantine threats 
 Intrusion detection and prevention 
equipment can help to mitigate threats 
 Content filtering prevents employees from 
going to malicious sites 
 Always try to stay one step ahead of the 
enemy! 
What Your Business is Doing for You… 
Protecting You and Your Data from Threats
What Your Business is Doing for You… 
Current Trends in Networking Security 
 Bring Your Own Device Era 
 The increased popularity of BYOD allows guests to bring in their own portable 
devices 
 The challenge is administrators cannot ensure these devices are malware-free 
 Gartner is predicting a large influx of phone-based viruses with malware 
attackers focusing on Android devices 
What’s “In” Right Now?
What Your Business is Doing for You… 
Current Trends in Networking Security 
• Internet of Things 
• With all of your devices connected– could this be an easy avenue for security 
vulnerability? 
• Many companies are compartmentalizing networks, and adding encryption at all 
levels. 
• Insiders will still remain the largest threats to businesses due to unknowingly 
using compromised devices 
Vulnerabilities…..Everywhere!
What Your Business is Doing for You… 
The Future of Network 
Security 
 With many attacks aimed at stealing financial 
data, banking websites will need to get more 
sophisticated in order to combat threats 
 Hospitals may be at risk, since they spend very 
little on cybersecurity, and have highly-sensitive 
information to protect 
Where Are We Heading?
What Your Business is Doing for You… 
The Future of Network Security 
 BYOD will become more common and an integral part of the 
threat landscape 
 As time goes on there will be vulnerabilities found and exploited 
in cloud computing 
 The Internet Of Things will make it more difficult to secure 
networks due to numerous device vulnerabilities 
Where Are We Heading?

More Related Content

PPTX
Secure Data Workflow
PPTX
Cyber Security: A Common Problem 2018
PDF
Customer information security awareness training
PPTX
Threat Modelling And Threat Response
PDF
Cyber Security Awareness
PPTX
Securing data flow to and from organizations
PDF
Introduction to Cybersecurity
PPTX
Cybersecurity Training
Secure Data Workflow
Cyber Security: A Common Problem 2018
Customer information security awareness training
Threat Modelling And Threat Response
Cyber Security Awareness
Securing data flow to and from organizations
Introduction to Cybersecurity
Cybersecurity Training

What's hot (20)

PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PPTX
Protection against cyber threats
PPTX
Introduction to cyber security
PDF
Cybersecurity Series - Cyber Defense for Internal Auditors
PDF
Cybersecurity Awareness E-Book - WeSecureApp
PDF
IT security in 2021: Why Ransomware Is Still The Biggest Threat
PPT
Introduction to Cyber Security
PPTX
Digital Security
PDF
Cybersecurity technology adoption survey
PDF
Anatomy of a cyber attack
PDF
Computer Security Threats
PPTX
Basic Security Training for End Users
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PDF
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
PPT
Executive Information Security Training
PDF
10 steps to cyber security
PPTX
CYBER SECURITY
PPTX
Ppt growing need of cyber security
PPTX
Introduction to Cyber Security
PPTX
Reducing the Impact of Cyber Attacks
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Protection against cyber threats
Introduction to cyber security
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Awareness E-Book - WeSecureApp
IT security in 2021: Why Ransomware Is Still The Biggest Threat
Introduction to Cyber Security
Digital Security
Cybersecurity technology adoption survey
Anatomy of a cyber attack
Computer Security Threats
Basic Security Training for End Users
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Executive Information Security Training
10 steps to cyber security
CYBER SECURITY
Ppt growing need of cyber security
Introduction to Cyber Security
Reducing the Impact of Cyber Attacks
Ad

Viewers also liked (20)

PPTX
Network security
PPTX
Preventing Known and Unknown Threats
PDF
Defense Innovation Summit
PDF
Net Generation
PPTX
National Cyber Security Awareness Month - Michael Kaiser
PPT
Avoid the Legal Traps of Relocating Jobs
PDF
Top 10 Facts About Data Breaches
PDF
C-Sec Pro
PDF
Cyber security-awareness-for-social-media-users - Devsena Mishra
PPTX
Network security - Basic concepts
PPTX
Cyber Security Awareness October 2014
PPTX
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
PPTX
Cyber awareness program
PPT
Security testing
PDF
Crestwood investor presentation march 2017
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
PPTX
Cyber security awareness for end users
PPTX
Motivational Slides
PPTX
How to study well
PPT
File Management
Network security
Preventing Known and Unknown Threats
Defense Innovation Summit
Net Generation
National Cyber Security Awareness Month - Michael Kaiser
Avoid the Legal Traps of Relocating Jobs
Top 10 Facts About Data Breaches
C-Sec Pro
Cyber security-awareness-for-social-media-users - Devsena Mishra
Network security - Basic concepts
Cyber Security Awareness October 2014
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Cyber awareness program
Security testing
Crestwood investor presentation march 2017
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber security awareness for end users
Motivational Slides
How to study well
File Management
Ad

Similar to Network Security for Employees (20)

PDF
cyber security services | MasGlobal Services
PDF
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
PDF
Guarding the Digital Fortress.pdf
PPTX
La sécurité de l'emploi : protégez votre SI
PPTX
2014CyberSecurityProject
PDF
Cyber Security
PPTX
SAHITHI.PPT.pptx
PPTX
Cyber Security: A Hands on review
PPTX
Cyber security
PDF
Cyber Security Course in Dubai: Learn from Industry Experts
PPTX
The Importance OF Cybersecurity and trends
DOCX
CyberCore – Security Essentials_ Protecting Your Digital World.docx
PDF
cybersecurity is the awareness to prevent cyber threats
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PDF
cybersecurity-140713064844-phpapp01.pdf
PDF
cybersecurity-140713064844-phpapp01.pdf
PPTX
Cyber security
PPTX
cybersecurity.pptx
PDF
Top 10 Cyber security Threats | Cyber security
PDF
Type of Security Threats and its Prevention
cyber security services | MasGlobal Services
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress.pdf
La sécurité de l'emploi : protégez votre SI
2014CyberSecurityProject
Cyber Security
SAHITHI.PPT.pptx
Cyber Security: A Hands on review
Cyber security
Cyber Security Course in Dubai: Learn from Industry Experts
The Importance OF Cybersecurity and trends
CyberCore – Security Essentials_ Protecting Your Digital World.docx
cybersecurity is the awareness to prevent cyber threats
Cybersecurity 140713064844-phpapp01 (1)-converted
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
Cyber security
cybersecurity.pptx
Top 10 Cyber security Threats | Cyber security
Type of Security Threats and its Prevention

More from OPSWAT (12)

PDF
How to Identify Potentially Unwanted Applications
PDF
Securing Nuclear Facilities
PDF
3 Cases for Quarantine Confirgurations
PDF
Protecting the Oil and Gas Industry from Email Threats
PDF
Reasons for the Popularity of Medical Record Theft
PPTX
Metascan Multi-Scanning Technology for Linux
PPTX
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PPTX
Introduction to OESIS Framework
PPTX
Introduction to Metascan Client
PPTX
Metascan Multi-scanning Technology
PPTX
The Value of Multi-scanning
How to Identify Potentially Unwanted Applications
Securing Nuclear Facilities
3 Cases for Quarantine Confirgurations
Protecting the Oil and Gas Industry from Email Threats
Reasons for the Popularity of Medical Record Theft
Metascan Multi-Scanning Technology for Linux
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Malware and Anti-Malware Seminar by Benny Czarny
Introduction to OESIS Framework
Introduction to Metascan Client
Metascan Multi-scanning Technology
The Value of Multi-scanning

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Spectroscopy.pptx food analysis technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
Spectroscopy.pptx food analysis technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MIND Revenue Release Quarter 2 2025 Press Release
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Network Security for Employees

  • 1. Network Security Josh Dean Director of IT jdean@opswat.com October 2014
  • 2. Network Security - 1990’s  Basic and default security settings were utilized  Only one antivirus program was usually installed on devices  Very rudimentary security measures were in place  Didn’t have to worry about cellphones or tablets Network Security Then and Now Back in the Day….
  • 3. Network Security - 2014  Cyber-attacks are more sophisticated and targeted  Every machine must be secured and hardened to combat complex forms of malware  Rise in BYOD further complicates the issue for network administrators  Data breaches are costing companies 100’s of millions of dollars Network Security Then and Now What is the Security Environment like Now?
  • 4.  Create complex passwords using numbers and symbols  Never use any security questions that can be found on your social media accounts  Lock your device at all times! What We Can Do to Help Don’t Make Yourself a Target What Can We Do To Protect Ourselves?
  • 5. What Can We Do To Protect Ourselves?  Report stolen items immediately  Have a “brick my device” application What We Can Do to Help Don’t Make Yourself a Target  Never make pin numbers out of any of your personal identifiable information  Don’t let anyone unfamiliar near computers unattended
  • 6. What Your Business is Doing for You… Protecting You and Your Data from Threats Protecting Your Data  Multi-tiered Strategy  Systems have centrally managed security applications in place  Servers are hardened, and additional measures are taken to secure the data  Next-gen equipment can shut down threats as they happen  Networking devices are able to examine potential threats in real-time
  • 7. Protecting Your Data  High-end networking equipment can shut down nodes automatically to contain and quarantine threats  Intrusion detection and prevention equipment can help to mitigate threats  Content filtering prevents employees from going to malicious sites  Always try to stay one step ahead of the enemy! What Your Business is Doing for You… Protecting You and Your Data from Threats
  • 8. What Your Business is Doing for You… Current Trends in Networking Security  Bring Your Own Device Era  The increased popularity of BYOD allows guests to bring in their own portable devices  The challenge is administrators cannot ensure these devices are malware-free  Gartner is predicting a large influx of phone-based viruses with malware attackers focusing on Android devices What’s “In” Right Now?
  • 9. What Your Business is Doing for You… Current Trends in Networking Security • Internet of Things • With all of your devices connected– could this be an easy avenue for security vulnerability? • Many companies are compartmentalizing networks, and adding encryption at all levels. • Insiders will still remain the largest threats to businesses due to unknowingly using compromised devices Vulnerabilities…..Everywhere!
  • 10. What Your Business is Doing for You… The Future of Network Security  With many attacks aimed at stealing financial data, banking websites will need to get more sophisticated in order to combat threats  Hospitals may be at risk, since they spend very little on cybersecurity, and have highly-sensitive information to protect Where Are We Heading?
  • 11. What Your Business is Doing for You… The Future of Network Security  BYOD will become more common and an integral part of the threat landscape  As time goes on there will be vulnerabilities found and exploited in cloud computing  The Internet Of Things will make it more difficult to secure networks due to numerous device vulnerabilities Where Are We Heading?