340 likes | 355 Views
Staffing and Security : IT Security Basics for the Staffing Professional the Basics of Modern Cybersecurity for Staffing Firms. Jon King. Verbena Williams. I.T. Director Employment Enterprises, Inc. Chief Financial Officer Employment Enterprises, Inc. Agenda.
E N D
Staffing and Security :IT Security Basics for the Staffing Professional the Basics of Modern Cybersecurity for Staffing Firms
Jon King Verbena Williams I.T. Director Employment Enterprises, Inc. Chief Financial Officer Employment Enterprises, Inc.
Agenda • Group Discussion: What are we doing today to keep our businesses safe? • We all come from different organizations. What are we all doing that’s the same? What are some challenges faced in your firms? What unique solutions are you using? • Why data security is so important • A brief overview of the threat landscape and some basic definitions of common terms used by security professionals • What’s in our toolboxes • What tools do security professionals use when working with companies like ours? What can we all do to help?
Staffing and Security:Why data security is so important in our business A brief overview of the unique challenges faced by today’s small to mid sized staffing firms
Big Target Small Business
What assets do staffing firms keep that hackers would want? • Names • Date of Birth • SSN • Address • Credit Card/Bank Information – both employees and company • Salary • Employer • And in some cases - Family member’s names and SSN • And most sought after by hackers- $$
Big Target Small Business What does a data breach at a staffing firm look like?
Big Target Small Business But its not just one story…
Big Target Small Business But bad press is the tip of the iceburg
Big Target Small Business
Big Target Small Business Why are hackers targeting us? • Staffing firms: • - tend to be smaller: less than 100 internal employees • - handle large volumes of transactions • - function more like a small business than a bank • - work with 2 sets of clients – customers and employees • - sometimes have conflicting agendas
Big Target Small Business What can we do about it? • Make security a priority in your organization. Conversationally, financially and operationally. • Raise awareness: an educated and informed workforce that’s taught to be “skeptical” and “vigilant” is the single most important security measure. They are your first line of defense. Without it, your chances of avoiding the threats for long go way down very fast. • Make sure your vendors are doing all they should to protect the data you entrust them with. Ultimately you can be considered responsible for your data that is compromised in a vendor breach! • Share and discuss the numbers so everyone understands the threats and the possible solutions we all can be implementing.
Big Target Small Business Small-to-medium business experience the highest risk of cyberattack Small businesses often have more vulnerabilities than large ones, so they tend to be targeted more frequently by hackers. Approximately 58% of malware attack victims fall into the small business category.
Big Target Small Business
Big Target Small Business
Big Target Small Business So what do you do? How do you fight back when the threats are everywhere and gaining sophistication every day?
Staffing and Security:What’s in our Toolbox? An overview of the modern tools used by cybersecurity professionals
The Security Professional’s Toolbox Older security tools we have used for a long time. • Firewalls • Antivirus • Network monitoring • Tape Backups • UPS and generators • Backup internet connections • Active directory • VPN • Premise based Spam filtering We still use most / a lot of these today.
The Security Professional’s Toolbox Firewall Antivirus
The Security Professional’s Toolbox Network Monitoring Tape Backup
The Security Professional’s Toolbox UPS and Generator Backup Internet Connection
The Security Professional’s Toolbox Newer Security Tools: • Next gen antivirus • Next gen firewalls • Virtual server replication with inflated cold standbys • SaAS providers • Multifactor Authentication • Cloud based network, endpoint and firewall monitoring • Security audits • Penetration testing • Hosted email filtering services • Awareness training
The Security Professional’s Toolbox Next Generation Antivirus Next Generation Firewall A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), and an intrusion prevention system (IPS). • NGAV is the natural (and much needed) evolution of traditional AV that protects computers from the full spectrum of modern cyber attacks, delivering the best endpoint protection with the least amount of work. NGAV speaks to a fundamentally different technical approach in the way malicious activity is detected and blocked. • NGAV takes a system-centric view of endpoint security, examining every process on every endpoint to algorithmically detect and block the malicious tools, tactics, techniques and procedures (TTPs) on which attackers rely.
The Security Professional’s Toolbox Virtual Server Replication SECaas Providers
The Security Professional’s Toolbox Multifactor Authentication Cloud based network, endpoint and firewall monitoring Cloud based Firewall, endpoint and network monitoring delivers around-the-clock security event and device health monitoring, management of upgrades, changes and patching, policy auditing, and intelligence-enhanced threat protection to help keep your environment safe
The Security Professional’s Toolbox Security Audits Penetration Testing
The Security Professional’s Toolbox Hosted email Filtering Service Cyber Insurance
The Security Professional’s Toolbox 3rd Party and Cloud Provider Vetting • Your vendor and cloud provider vetting process should focus on the extent to which your vendors: • have adopted and enforce appropriate security policies and procedures; • have created appropriate incident response and disaster recovery plans, and tests them • comply with applicable federal, state, local laws, • have created a reliable program to maintain its information technology infrastructure and operations that are consistent with your privacy and data security objectives • have identified data breaches and vulnerabilities in the past, and how they remediated them. • In addition to performing vendor vetting, you should consider adding provisions in your vendor contracts to address the cybersecurity risks that your vendors face. • Ideally, your contracts with vendors that you provide PII to should address the following issues: • Which personnel at the vendor will have access to legally-protected and other sensitive information that you will provide to the vendor? • Representations and warranties by the vendor • The vendor’s obligation to notify you if they suffer a data breach. • Oversight of your vendor’s data security procedures and practices. • Indemnification. • Vendors’ Communications With Your Employees.
The Security Professional’s Toolbox Awareness Training Ways to protect yourself Verify – verbally or normal means of communication Never click a link in an email you don’t trust Most companies will not ask for information they already have Use multiple versions of your password • Tone of the email • Address of sender • Links in the body of the email • Reasonable
The Security Professional’s Toolbox Different Options for Password Creation • Select 2 numbers that mean something to you (19) • Select 2 letters that you can remember (LW) • What is your favorite color (blue) • Use a symbol • What year did you graduate from HS (94) Now you put that together 19LWblue@94 It is simple for you to remember, but not for others to guess, then you use version of the base number for different sites: Bank – Suntrust 19LWblue@94 ST - Chase 19LWblue@94CB
The Security Professional’s Toolbox Security in concert AKA taking a layered approach to security
Staffing and Security:Group Discussion What are we doing to keep our business safe?