SlideShare a Scribd company logo
Business Information Solutions Inc.
presents

“Is Your Company at Risk
for a Security Breach?
Lunch & Learn March 6, 2014

EVENT AGENDA

11:30 – 11:45 AM
Sign In & Welcome/Introduction
Christi Kannapel, Marketing & PR, Business Information Solutions Inc.
11:45 – 11:55 AM
BIS Overview
Phillip Long, CEO of Business Information Solutions Inc.
11:55 AM – 12:30 PM
Security
Phillip Long, CEO of Business Information Solutions Inc.
12:30 – 12:55 PM
Barracuda: Web & Spam Filters
Ally Knapp, Regional Sales Manager, Barracuda Networks Inc.
12:55 – 1:15 PM
Wrap-up, Q & A, Survey Request & Thank You
Phillip Long, CEO of Business Information Solutions Inc.
1:15 – 1:30 PM
Drawings & Giveaways
BIS "Is Your Company at Risk for a Security Breach?"
Founded

April 2001 by…
…These Guys!
Phillip Long

CEO

Kevin Welch
COO
32 Employees
Sales & Services Annual
Revenue

$6 million
3 Alabama Locations
1. Robertsdale

2. Bay Minette
http://www.city-data.com/county/Baldwin_County-AL.html

3. Mobile
3 Complimentary Divisions
Information Technology

Copiers & Printers

Web & Marketing
Web & Marketing
•
•
•
•
•
•

Website Development
Mobile Websites
Email & Social Media Marketing
Print & Marketing Materials
Corporate Branding
SEO
Copiers & Printers
•
•
•
•
•
•

Network Copiers/Printers/Scanners
Document Management Solutions
Wide-Format Printing & Plotters
Cloud Printing & Scanning
Multi-function Office Equipment
OEM & Private Label Toners
Information Technology
• Consulting Services
•
•
•

ISP Management
Vendor Management
Business Process Management

• Business Continuity
•
•
•
•

BIS Back Up
Disaster Recovery
BIS Cloud Sync
Highly Available Storage Solutions
Information Technology
•
•
•
•

Cloud Hosting Platform
BIS Hosted Exchange
VOIP Phone Systems
Network Security Management
•
•
•

Gateway Security
Desktop Security
Wireless Security
Vision
To accelerate the success of
our clients through giving

more value than we
accept in payment.
Mission
We deliver solutions to our

clients to help

them
overcome challenges
that threaten the health of
their business.
Values
Proactive
Honest
Innovative
Ready
Reliable
We are DIFFERENT!
• Offer expertise to give you a
competitive edge in your industry
• Go beyond the “fix” to ensure your
continued success
Security
“If you spend more on coffee than on IT
security, you will be hacked, What’s more,
you deserve to be hacked.”
-Richard Clarke
DID YOU

KNOW
1 out of 5 small
businesses is a victim of
cybercrime every year.
Within 6 months, 60% of
those cybercrime victims

go out of business.
The average cost of a
single, successful cyber
attack is $300K.
Source: IBM X-Force Trend and Risk Report
Can you afford not
to take action?
“Treat your password like your
toothbrush. Don’t let anybody
else use it, & get a new one
every six months.”
-Clifford Stoll
Top Causes of Security Breaches
•
•
•
•
•
•

Underestimating Cyber Criminals
Bad Password Practices
Loss of Device
Outdated Software
Weak Firewall
Mobile Device Security
Do you remember to
update your software?
Have you secured your

mobile device?
What steps are you taking
to protect your company
from cyber

criminals?
DID YOU

KNOW
Weak or stolen credentials
account for 76% of network
intrusions.

Source: Verizon 2013 Data Breach Investigations
61%
Source: Sybase White Paper

report that
business use of
smartphones is
their top security
concern.
25% of all workers will have
lost a mobile device
that would allow access to
confidential information.

Source: Sybase White Paper
Only 6%
of companies recognize the true
scale of the threat of malicious
programs that are appearing daily.

Source: 2013 Global Corporate IT Security Risks survey
Does your company

recognize the threat?
Security Solutions
Security prevention is less
costly than the cyber crime.
-CSO
Managed
Services
Why Managed
Services?
• 24/7 Network Management
• Asset Management
• Fixed Rate Monthly Pricing
• Improved Performance & Network
Availability
• Proactive Network Management
• Immediate Help Desk & Onsite
Support
90%

of attacks can be
prevented by
keeping your
system fully up to
date.

Source: Sophos
Web Filter
Barracuda Next-Generation
Firewall
BIS "Is Your Company at Risk for a Security Breach?"
Market Trends
What happened in 2013

1. Breaches

Increase in
security breaches

3. Malware

Use of malware
and root kits
continues to rise

2. The Cloud

SMB’s continue
to migrate to
cloud-based
applications

4. Mobile Users

1 in 10 remote
users infected
1 million New
iPhone and
Androids Daily
Security Concerns

Targeted Attacks

Personal and Private
Information

Advanced Persistent
Threats

Denial-of-Service

Drive-by Downloads
New Technology Challenges

Mobile Devices

The Cloud

Social Media Sites

Bandwidth Utilization

Application Control
Same Resource Constraints

Limited IT Staff

Limited Budgets

New Compliance Requirements
The Solution
Barracuda Next-Generation Firewall
Central Cloud
Management
Best-of-Breed
Security

Fixes UTM
Performance Issues
Total Cost of
Ownership
Application Regulation
Dynamic Link Management
Balance traffic over multiple Internet links
Automated Failover
Failover, Round Robin, or Weighted balancing available

ISP 1
60% of HTTP

ISP 2
20% of HTTP

ISP 3
20% of HTTP
Site-to-Site/Remote User Connectivity

IPsec Site -toSite VPN

Client-to-Site VPN
IPsec, PPTP, SSL

SSL VPN*: BFW X200 and higher

SSL VPN

Internal
Corporate
Resources
Cloud Offload

User, URL, AV, reporting
The Solution in Action
Paulsoboro School District

25,000 concurrent
users
K-12
3 sites

Barracuda Firewall x600
Looking Ahead…
Barracuda Firewall v6.5 - April 2014
• Revamped Interface
• Local Web-Filtering
• Improved Application Awareness
Questions

James Tolosa
Jtolosa@barracuda.com
Questions &
Answers
Phillip Long, CEO
Business Information Solutions Inc.
251.923.4027
plong@askbis.com

James Tolosa,
Security Product Manager
Barracuda Networks Inc.
Special Offer
Contact:

Phillip Long, CEO
251.923.4027
plong@askbis.com

FREE, NO
STRINGS
ATTACHED
Network
Evaluation
Fill Out the Survey &
Be Entered to

Win a Gift Card to:

More Related Content

PPTX
The Top 7 Causes of Major Security Breaches
PPTX
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
PDF
Security in the News
PPTX
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
PDF
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
PDF
Digital Transformation and Security for the Modern Business Part 1 – Finance
PPTX
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
PDF
Why cyber-threats could kill your business transformation
The Top 7 Causes of Major Security Breaches
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Security in the News
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Digital Transformation and Security for the Modern Business Part 1 – Finance
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Why cyber-threats could kill your business transformation

What's hot (20)

PPTX
Securing Privileged Access “Inside the Perimeter”
PDF
Microsoft power point closing presentation-greenberg
PDF
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
PPTX
Community IT Webinar: Working with an Outsourced IT Manager
PPTX
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
PPTX
Alpha & Omega's Managed Security
PPTX
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
PPTX
IT Security for Nonprofits
PPTX
Aaron Higbee - The Humanity of Phishing Attack & Defense
PDF
"Thinking diffrent" about your information security strategy
PPTX
Backups and Disaster Recovery for Nonprofits
PDF
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
PDF
Next-level mobile app security: A programmatic approach
PDF
Primer for Information Security Programs
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PPTX
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
PPTX
Threat Intelligence + SIEM: A Force to be Reckoned With
PPTX
Tre Smith - From Decision to Implementation: Who's On First?
PPTX
Be the Hunter
PPTX
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Securing Privileged Access “Inside the Perimeter”
Microsoft power point closing presentation-greenberg
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Community IT Webinar: Working with an Outsourced IT Manager
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Alpha & Omega's Managed Security
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
IT Security for Nonprofits
Aaron Higbee - The Humanity of Phishing Attack & Defense
"Thinking diffrent" about your information security strategy
Backups and Disaster Recovery for Nonprofits
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Next-level mobile app security: A programmatic approach
Primer for Information Security Programs
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Threat Intelligence + SIEM: A Force to be Reckoned With
Tre Smith - From Decision to Implementation: Who's On First?
Be the Hunter
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Ad

Similar to BIS "Is Your Company at Risk for a Security Breach?" (20)

PDF
2015 Cyber Security
PPTX
Ashley Pillay- Navigating Through Cyber Security During a Cyber Pandemic
PDF
Netwealth educational webinar: Peace of mind in a digital world
PPTX
Continuing Education Conferance
PDF
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
Top 6 things_small_businesses_q12015
PDF
Building Cyber Resilience
PDF
Building Cyber Resilience in the Digital Economy
PPTX
Too Small to Get Hacked? Think Again (Webinar)
PPTX
Top 5 Cybersecurity Trends in 2021 and Beyond
PDF
Quantifying Cyber Risk, Insurance and The Value of Personal Data
PPSX
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
PPTX
Be More Secure than your Competition: MePush Cyber Security for Small Business
PPTX
CyberSecurity Services and Why Cybersecurity is required
PDF
The Small Business Cyber Security Best Practice Guide
PDF
California’s top 5 cybersecurity companies
PPTX
Cyberlink Deck
PDF
Cyber Security at CTX15, London
PPTX
Insights from 2016 Cyberthreat Defense Report
2015 Cyber Security
Ashley Pillay- Navigating Through Cyber Security During a Cyber Pandemic
Netwealth educational webinar: Peace of mind in a digital world
Continuing Education Conferance
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Top 6 things_small_businesses_q12015
Building Cyber Resilience
Building Cyber Resilience in the Digital Economy
Too Small to Get Hacked? Think Again (Webinar)
Top 5 Cybersecurity Trends in 2021 and Beyond
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Be More Secure than your Competition: MePush Cyber Security for Small Business
CyberSecurity Services and Why Cybersecurity is required
The Small Business Cyber Security Best Practice Guide
California’s top 5 cybersecurity companies
Cyberlink Deck
Cyber Security at CTX15, London
Insights from 2016 Cyberthreat Defense Report
Ad

Recently uploaded (20)

PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
August Patch Tuesday
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Spectroscopy.pptx food analysis technology
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Programs and apps: productivity, graphics, security and other tools
SOPHOS-XG Firewall Administrator PPT.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
August Patch Tuesday
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Univ-Connecticut-ChatGPT-Presentaion.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Group 1 Presentation -Planning and Decision Making .pptx
A comparative study of natural language inference in Swahili using monolingua...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectroscopy.pptx food analysis technology
cloud_computing_Infrastucture_as_cloud_p
Programs and apps: productivity, graphics, security and other tools

BIS "Is Your Company at Risk for a Security Breach?"