Download KESB Advanced Presentation

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Data vault modeling wikipedia , lookup

Information security wikipedia , lookup

Expense and cost recovery system (ECRS) wikipedia , lookup

Open data in the United Kingdom wikipedia , lookup

Information privacy law wikipedia , lookup

Business intelligence wikipedia , lookup

Mobile business intelligence wikipedia , lookup

Computer security wikipedia , lookup

Transcript
IT SECURITY
WHAT IT MEANS FOR BUSINESS TODAY
KASPERSKY ENDPOINT SECURITY FOR BUSINESS - ADVANCED
March 2016
ANTIVIRUS ON IT’S OWN IS NO LONGER ENOUGH.
BUT WHAT’S NEXT?
→Ransomware resistance
→Business continuity
→Data protection
→Cost optimization
→Secure mobile
RANSOMWARE RESISTANCE
NO ONE IS SAFE FROM RANSOMWARE
RANSOMWARE HAS BECOME #1 PROBLEM OF IT SECURITY WORLDWIDE!
 Methodist Hospital in Henderson Kentucky
 Hackers locked thousands of patient’s files and deleted originals
 “We haven't seen crimes in such a large scale” - FBI says
 Another hospital in Los Angeles
 Hackers locked patients files and demanded ransom
 Hospital had choice but to pay about $17,000 to unlock them
 FBI also investigating the case now
 “Locky” Trojan infected users in 114 countries around the world in few days
 Most affected countries are France, Germany, India, USA and China
HOW THIS HAPPENS
HOW MULTILAYERED SECURITY WORKS
BUSINESS CONTINUITY
HACKERS GET ADVANCED
 Criminals worldwide now invest much more money and time to develop more
advanced malicious code.
 They continuously enhance anti-debugging techniques to protect malware from
being detected for much longer.
 Malware can have special modules to target specific systems, as happened to
Russia’s EnergoBank
 Malware Metel had specific modules to connect to trading systems
 Infected machines placed orders for USD sell/buy automatically
 This led to currency exchange fluctuations that caused problems with the
Central Bank - they refused to believe that EnrgoBank employees were not
involved
HOW THIS HAPPENED
EXPLOIT
MALWARE
QUIK
→ Duration: 14 min
→ Loss: $3.7 mln.
Link
→ Big issue with Central Bank
EXPLOIT
Transaq
Interruption of business processes can lead to issues with customers, partners or even regulators
SOLUTION THAT WORKS
EXPLOIT
AEP
WEB AV
MALWARE
QUIK
→ Vulnerability
assessment
→ Patch management
EXPLOIT
Transaq
Prevention is better than cure. Advanced technologies can scan networks to identify vulnerabilities caused
by unpatched applications or operating systems before automatically installing the required patches and
updates
DATA PROTECTION
“THIS WILL NEVER HAPPEN TO US”
Tax and Personal Data on thousands of students and workers at Kentucky
State University and Tidewater Community College in the US were exposed
via phishing requests
Data affected included 2015 W-2s forms and university IDs for employees and
students - including names, Social Security numbers and addresses.
1,071 people become victims of attack
An attacker sent a phishing email to a staffer, impersonating the school's
president Raymond Burse, requesting 2015 W-2s data for employees. The
employee sent the data, unaware that the email was not from Burse.
WHERE THE PROBLEM IS
TODAY, BUSINESSES PROCESS AND STORE MASSIVE VOLUMES OF INFORMATION, INCLUDING:
 Their own intellectual property
 Designs and ‘know how’ owned by business
partners
 Confidential, personal information about
employees
 Sensitive information about customers
Data loss caused by theft or accidents could entail costs or legal problems for violating data
protection regulations.
•
•
65% of data loss caused by human factors
32% of data loss caused by IT threats
SOLUTION THAT WORKS
Encryption is an effective way to protect a
company from the risks associated with data
loss caused by malware or even device
loss/theft.
SECURE MOBILE
PUBLIC WIFI THREATS
US. In-flight (and any public) Wi-Fi insecurity: journalist's emails were hacked by fellow traveler
USA Today and Washington Post newspaper columnist Steven Petrow has exposed serious flaws in
aeroplane wifi
On a recent flight, a fellow passenger hacked into his laptop computer and read his emails
He learned of the security breach from the hacker after he used Gogo (the biggest on-board WiFi
provider in the US)
This problem is relevant not only for in-flight WiFi but for every public wireless network . So employee
laptops have to be properly defended before leaving the company's security perimeter.
HOW THIS HAPPENS
Information sent over public Wi-Fi can easily be intercepted by criminals
Be aware!
•
Malicious applications that users can download
•
Phishing links that users can open from mobile browser
•
Device jailbreak that removes security functions
•
Leaving device unlocked or even loss of the device
SOLUTION THAT WORKS
Mobile device management (MDM) helps to secure mobile devices properly
You need to know
•
You can block the use of unsecured public wifi
•
You can encrypt sensitive data within applications
•
You can block an application installation to protect against malware
•
You can remotely wipe the most sensitive data from a device
COST OPTIMIZATION
ELEGANT OPTIMIZATION OF IT EXPENSES
BANKING CIOS SAYS:
"As it turned out, crises differ. In 2008, there was a clear prospect while now there is no clear
understanding of what the year 2016 will bring. Therefore, most of the players have reduced their IT
budgets to a minimum, which allows them to maintain the current infrastructure. Accordingly, I would
understand the IT ratio support/development in the budget of the average bank as 90% / 5% + 5% on
unexpected expenses”
"Some of our customers have cut their IT budgets by 20-25%, and even more. Only the expenses on
providing vital functions - support of the existing IT infrastructure, information security and implementation
of legislative requirements - remained inviolable"
"At the moment the expenditures for IT is the biggest cost item in any bank. Therefore a clear IT strategy
and the cost effectiveness evaluation system for this area is required. The objective of IT today is to
enable the bank to optimize its costs and to make money. "
WHERE THE PROBLEM IS
Price 1
+ cost of education
Price 2
Price 3
+ cost of education
Using multiple, different security solutions without any clear standards around the software used or any
centralized automation and control tools can actually cost more to support, thanks to hidden and indirect
operational expenses.
SOLUTION
Comprehensive solution
at a single price
AUTOMATIC HARDWARE
AND SOFTWARE
INVENTORY
CENTRALIZED IT SECURITY
MANAGEMENT FOR ALL
TYPES OF WORKSTATIONS
AUTOMATED OS
INSTALLATION AND
REINSTALLATION
REMOTE WORK WITH
DISTRIBUTED NETWORKS
REMOTE INCIDENT
RESOLUTION
No additional training
Centralized management and
unified service
A single platform for a wide range of system administration functions (Systems Management)provides a
centralized approach and tool for managing different IT areas, automating routine IT tasks and transparent
monitoring of IT security - without additional maintenance costs and expenses for staff training. That
creates savings for the IT budget without compromising on the quality of protection.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
ADVANCED
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
ADVANCED
Encryption
Vulnerability Assessment
Patch Management
Systems Management
Security for Mobile
Mobile Device Management &
Mobile Application Management
Anti-Cryptor – NEW!
Server Application Control – NEW!
THANK YOU!