IT & DATA SECURITY BREACH PREVENTION

Similar documents
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION

Getting over Ransomware - Plan your Strategy for more Advanced Threats

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

10 BENEFITS THAT ONLY AN INTEGRATED PLATFORM SECURITY SOLUTION CAN BRING

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

ADDRESSING TODAY S VULNERABILITIES

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Cyber security tips and self-assessment for business

Best Practices in Securing a Multicloud World

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

BEST PRACTICES FOR PERSONAL Security

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Are You Avoiding These Top 10 File Transfer Risks?

How to Build a Culture of Security

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Preparing your network for the next wave of innovation

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Any conversation about virtualization for small- and medium-sized businesses (SMBs) usually starts around

ANATOMY OF AN ATTACK!

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

The security challenge in a mobile world

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Train employees to avoid inadvertent cyber security breaches

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Top 10 Considerations for Securing Private Clouds

5 IT security hot topics How safe are you?

Kaspersky Security. The Power to Protect Your Organization

Defensible and Beyond

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

Keep the Door Open for Users and Closed to Hackers

Free antivirus software download

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

mhealth SECURITY: STATS AND SOLUTIONS

Security and Compliance for Office 365

Kaspersky Small Office Security 5. Product presentation

Mobile App Security and Malware in Mobile Platform

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

How NOT To Get Hacked

Introduction to

Make security part of your client systems refresh

2018 Edition. Security and Compliance for Office 365

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Cyber Security Stress Test SUMMARY REPORT

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES

A quick-reference guide to secure your organization s data and reduce cybersecurity attacks

Who We Are! Natalie Timpone

PROTECTING YOUR BUSINESS ASSETS

2017 Annual Meeting of Members and Board of Directors Meeting

CloudSOC and Security.cloud for Microsoft Office 365

6 Ways Office 365 Keeps Your and Business Secure

FIREWALL BEST PRACTICES TO BLOCK

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

What is Penetration Testing?

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Security Automation Best Practices

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Symantec Protection Suite Add-On for Hosted Security

How BlackBerry 2FA and BlackBerry UEM Help This Law Enforcement Agency to Protect and Serve New York

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

10 Quick Tips to Mobile Security

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Correlation and Phishing

Six Ways to Protect your Business in a Mobile World

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Securing Digital Transformation

Norton Online Reputation Report: Why Millennials should manage their online footprint

Fighting Phishing I: Get phish or die tryin.

Securing Today s Mobile Workforce

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Crash course in Azure Active Directory

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

BUFFERZONE Advanced Endpoint Security

PBX Fraud Information

Seqrite Endpoint Security

Remote Desktop Security for the SMB

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Methodology USA UK AUSTRALIA CANADA JAPAN N=1,008 MOE=+/-3% N=1,044 MOE=+/- 3% N=1,028 MOE=+/- 3% N=1,025 MOE=+/- 3% N=1,005 MOE=+/- 3%

Building a Smart Segmentation Strategy

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

CYBERSECURITY RISK LOWERING CHECKLIST

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon

PREPARE & PREVENT. The SD Comprehensive Cybersecurity Portfolio for Business Aviation

Security Awareness. Presented by OSU Institute of Technology

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

The SD-WAN security guide

How Network Security Services Work to Protect Your Business

Transcription:

IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks

CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE NETWORKS INCREASE IN COMPLEXITY, KEEPING THEM SECURE IS MORE CHALLENGING. With employees connecting to unsecured public networks and running multiple applications, sensitive corporate data is more vulnerable than ever before. There s a lot to think about, and for your security policies to be effective, they need to bring all users and their devices under IT control and regulate employee behavior. Though that sounds daunting, it could all be much easier than you think. This guide is designed to simplify some of the issues and provide you with straightforward, practical tips that will help you protect your network and data, while giving your employees the knowledge they need to keep themselves and your business safe.

EMPLOYEES: IT SECURITY HYGIENE BEST PRACTICE THE STORY Thomas is the company CEO. He needs to stay connected, so as well as a laptop, he also uses his company smartphone and personal tablet for work. Naturally, they contain sensitive information. He knows this needs to be protected, so he sets a password and a PIN - the same password he uses for his email and social media logins. The same PIN number he uses for his credit card. This is a typical example of poor hygiene. If just one of his personal accounts gets hacked, it could open the door to a critical loss of corporate data. 59 % of people fail to store their passwords securely Source: Kaspersky Password Infographic

OVERVIEW No matter what defenses you have in place, prevention is always better than a cure. And by making sure that all employees are taking basic steps to protect themselves, you can go a long way to reducing the risk of a security breach. Something as simple as strong, unique passwords can make a huge difference. But we re all human. And even when we know we shouldn t, we re usually tempted to make life easier for ourselves. That s why 63% of us use easy-to-guess passwords, and 39% use the same one for all of our accounts. In other cases, employees may be unaware of the risks they re facing. Suspect links and unsafe email attachments may be an obvious danger to you, but the same isn t true for everyone in your organization. No matter what defenses you have in place, prevention is always better than a cure. That s why it s important to use both education and systems control to turn best practice into a security policy that s adopted and followed by everybody in the business.

PRACTICAL ADVICE 1 2 3 When it comes to passwords, you re in a position to control size, complexity and repetitive use. So use your policy to take away the temptation for employees to take shortcuts. Make sure employees know the characteristics of phishing and potentially dangerous web addresses. Encourage them not to open links from unknown sources, to open any links they re unsure about in a separate window and to check URLs for consistency. No one should be opening files from unknown sources, whether it s personal or work related. This should be a key element of your security policy.

TOP TIP: Passwords should be at least eight characters long and include upper and lower case letters, numerals and special characters. TOP TIP: Before clicking through, employees should hover their mouse over links to check it s leading to the site they re expecting.

APPLICATIONS: MAKE PATCHING A PRIORITY THE STORY As you d expect of any accountant, Maria s always busy. Especially today. She simply doesn t have time to wait for application updates to install. She hits remind me later and moves on to more urgent matters. She s running old versions of Microsoft Office, Adobe Acrobat and most other applications she uses. But they work fine, so when reminders do pop up, she ignores them. 49 % of people do not regularly patch or update software and OS She gets through her hectic schedule and even manages to leave on time for a change. She heads home happy, unaware that the program she downloaded from a file sharing site earlier in the day was infected with malware, and that the malicious code has already exploited her unpatched applications and spread to the rest of the network.

OVERVIEW While it may not stop employees performing their day-to-day tasks, failure to update software increases the risk of a security breach. The majority of malware is designed to take advantage of vulnerabilities in applications. And the longer they re left unpatched, the longer cybercriminals have to exploit those vulnerabilities. 58 % of business have not fully implemented application control Source: Global IT Risks Report 2014 In fact, in most cases where attacks are launched through an application, a patch is already available. This is good news it means they could have been avoided with relative ease. Consequently you should make sure that you re taking measures to find and deploy all available patches, and to remove the software you don t want or need from your network.

PRACTICAL ADVICE 1 2 3 It s time consuming enough simply researching and prioritizing available patches, let alone deploying them. By using Kaspersky Endpoint Security for Business vulnerability and patch management features you can automate this process, reducing both your workload and the risk to your business. Give yourself the ability to spot and block unwanted applications and software that have found their way into your network. Kaspersky Endpoint Security for Business can give you both visibility and control of all software in use by your employees, helping you identify, register and track hardware and removable devices. Give yourself the tools to enforce your application policies. With Application Control you can allow, block and regulate applications and using Default Deny controls, you can automatically eliminate certain applications from your network. Adding an extra layer of defense, Application Privilege Control monitors and restricts any applications that appear to be performing suspiciously. So, even if a program is compromised, you can still prevent it from executing malicious actions. TOP TIP: You can disable the remind me later button, to ensure critical updates aren t ignored.

SUMMARY Providing your business with the best protection possible requires a mixture of enforcement and education. Employees have more freedom than ever before and that means they need to take more responsibility for their own safety than they may have done in the past. That said, there s a lot you can do to eliminate opportunities for risky behavior altogether. And if you also have the tools to put your policies into practice quickly and easily, then you can spend less time reacting to problems and more time looking at the bigger picture, anticipating dangers and putting preventative measures in place before issues arise. And that s really the most important thing to be proactive. You already understand the threats you re facing. Now, using the advice in this guide, you can take practical steps to protect your business. Employees have more freedom than ever before and that means they need to take more responsibility for their own safety than they may have done in the past.

PROTECT YOUR BUSINESS NOW. GET YOUR FREE TRIAL NOW JOIN THE CONVERSATION Watch us on YouTube Like us on Facebook Review our blog Follow us on Twitter Join us on LinkedIn Visit Knowledge Center Learn more at kaspersky.com/business

ABOUT KASPERSKY LAB Kaspersky Lab is the world s largest privately held vendor of endpoint protection solutions. The company is ranked among the world s top four vendors of security solutions for endpoint users.* Throughout its more than 17-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for large enterprises, SMBs and consumers. Kaspersky Lab, with its holding company registered in the United Kingdom, currently operates in almost 200 countries and territories across the globe, providing protection for over 400 million users worldwide. Call Kaspersky Lab today at 866-563-3099 or email us at corporatesales@kaspersky.com, to learn more about Kaspersky Endpoint Security for Business. www.kaspersky.com/business * The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2013. The rating was published in the IDC report Worldwide Endpoint Security 2014 2018 Forecast and 2013 Vendor Shares (IDC #250210, August 2014). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2013. 2015 Kaspersky Lab ZAO. All rights reserved. Registered trademarks and service marks are the property of their respective owners.