6 Steps to a stronger IT Security (3) PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: 6 Steps to a stronger IT Security (3)


1
6 StepsTo A StrongerIT Security
  • www.cybersechub.net

2
Risk Definition Establish the Cyber
SecurityEnvironment
  • A business, however small, must assess the risks
    to their information assets just as they do with
    other risk areas, such as regulatory risk.

www.cybersechub.net
3
NetworkSecurity
  • Connecting your business network to the Internet
    opens the door to attack.   Your network must be
    built to the accepted design and security
    management best principles with firewalls and
    traffic filtering rules. 

www.cybersechub.net
4
Malware Protection
  • Malware protection is provided most often by a
    software tool that sits as an interface between
    the corporate systems or user computer and the
    Internet.  

www.cybersechub.net
5
User Management
  • Users will have heard of malware, and will
    probably have met it on their home computers. 
    They will understand the need for online
    security and company policies and procedures
    around the use of the internet.   If not, they
    need an education programme.

www.cybersechub.net
6
Managing Removable Media
  • The most common way in which malware makes its
    way into business networks is via users bringing
    contaminated flash drives or DVDs from home and
    plugging them into their office computer.

www.cybersechub.net
7
Monitoring
  • Monitoring tools to record actual and attempted
    security breaches are essential.  This helps in
    identifying holes in online and cyber
    security that need to be plugged.

www.cybersechub.net
8
6 StepsTo A StrongerIT Security
  • www.cybersechub.net
Write a Comment
User Comments (0)
About PowerShow.com