6 Steps to a stronger IT Security (4) - PowerPoint PPT Presentation

About This Presentation
Title:

6 Steps to a stronger IT Security (4)

Description:

An appreciation of Cybersecurity and Network Security is essential for all IT people today. The incidence and sophistication of malware and of targeted attacks on corporate and individual sites are increasing daily. Individual and corporate users must have a comprehensive online security environment in place, comprised of a mix of online security measures and cyber security solutions. – PowerPoint PPT presentation

Number of Views:23

less

Transcript and Presenter's Notes

Title: 6 Steps to a stronger IT Security (4)


1
6 StepsTo A StrongerIT Security
  • www.cybersechub.net

2
Risk Definition Establish the Cyber
SecurityEnvironment
  • A business, however small, must assess the risks
    to their information assets just as they do with
    other risk areas, such as regulatory risk.

www.cybersechub.net
3
NetworkSecurity
  • Connecting your business network to the Internet
    opens the door to attack.   Your network must be
    built to the accepted design and security
    management best principles with firewalls and
    traffic filtering rules. 

www.cybersechub.net
4
Malware Protection
  • Malware protection is provided most often by a
    software tool that sits as an interface between
    the corporate systems or user computer and the
    Internet.  

www.cybersechub.net
5
User Management
  • Users will have heard of malware, and will
    probably have met it on their home computers. 
    They will understand the need for online
    security and company policies and procedures
    around the use of the internet.   If not, they
    need an education programme.

www.cybersechub.net
6
Managing Removable Media
  • The most common way in which malware makes its
    way into business networks is via users bringing
    contaminated flash drives or DVDs from home and
    plugging them into their office computer.

www.cybersechub.net
7
Monitoring
  • Monitoring tools to record actual and attempted
    security breaches are essential.  This helps in
    identifying holes in online and cyber
    security that need to be plugged.

www.cybersechub.net
8
6 StepsTo A StrongerIT Security
  • www.cybersechub.net
Write a Comment
User Comments (0)
About PowerShow.com