Published on March 7, 2014
Business Information Solutions Inc. presents “Is Your Company at Risk for a Security Breach?
Lunch & Learn March 6, 2014 EVENT AGENDA 11:30 – 11:45 AM Sign In & Welcome/Introduction Christi Kannapel, Marketing & PR, Business Information Solutions Inc. 11:45 – 11:55 AM BIS Overview Phillip Long, CEO of Business Information Solutions Inc. 11:55 AM – 12:30 PM Security Phillip Long, CEO of Business Information Solutions Inc. 12:30 – 12:55 PM Barracuda: Web & Spam Filters Ally Knapp, Regional Sales Manager, Barracuda Networks Inc. 12:55 – 1:15 PM Wrap-up, Q & A, Survey Request & Thank You Phillip Long, CEO of Business Information Solutions Inc. 1:15 – 1:30 PM Drawings & Giveaways
Founded April 2001 by…
…These Guys! Phillip Long CEO Kevin Welch COO
Sales & Services Annual Revenue $6 million
3 Alabama Locations 1. Robertsdale 2. Bay Minette http://www.city-data.com/county/Baldwin_County-AL.html 3. Mobile
3 Complimentary Divisions Information Technology Copiers & Printers Web & Marketing
Web & Marketing • • • • • • Website Development Mobile Websites Email & Social Media Marketing Print & Marketing Materials Corporate Branding SEO
Copiers & Printers • • • • • • Network Copiers/Printers/Scanners Document Management Solutions Wide-Format Printing & Plotters Cloud Printing & Scanning Multi-function Office Equipment OEM & Private Label Toners
Information Technology • Consulting Services • • • ISP Management Vendor Management Business Process Management • Business Continuity • • • • BIS Back Up Disaster Recovery BIS Cloud Sync Highly Available Storage Solutions
Information Technology • • • • Cloud Hosting Platform BIS Hosted Exchange VOIP Phone Systems Network Security Management • • • Gateway Security Desktop Security Wireless Security
Vision To accelerate the success of our clients through giving more value than we accept in payment.
Mission We deliver solutions to our clients to help them overcome challenges that threaten the health of their business.
Values Proactive Honest Innovative Ready Reliable
We are DIFFERENT! • Offer expertise to give you a competitive edge in your industry • Go beyond the “fix” to ensure your continued success
“If you spend more on coffee than on IT security, you will be hacked, What’s more, you deserve to be hacked.” -Richard Clarke
DID YOU KNOW
1 out of 5 small businesses is a victim of cybercrime every year.
Within 6 months, 60% of those cybercrime victims go out of business.
The average cost of a single, successful cyber attack is $300K. Source: IBM X-Force Trend and Risk Report
Can you afford not to take action?
“Treat your password like your toothbrush. Don’t let anybody else use it, & get a new one every six months.” -Clifford Stoll
Top Causes of Security Breaches • • • • • • Underestimating Cyber Criminals Bad Password Practices Loss of Device Outdated Software Weak Firewall Mobile Device Security
Do you remember to update your software?
Have you secured your mobile device?
What steps are you taking to protect your company from cyber criminals?
DID YOU KNOW
Weak or stolen credentials account for 76% of network intrusions. Source: Verizon 2013 Data Breach Investigations
61% Source: Sybase White Paper report that business use of smartphones is their top security concern.
25% of all workers will have lost a mobile device that would allow access to confidential information. Source: Sybase White Paper
Only 6% of companies recognize the true scale of the threat of malicious programs that are appearing daily. Source: 2013 Global Corporate IT Security Risks survey
Does your company recognize the threat?
Security prevention is less costly than the cyber crime. -CSO
Why Managed Services? • 24/7 Network Management • Asset Management • Fixed Rate Monthly Pricing • Improved Performance & Network Availability • Proactive Network Management • Immediate Help Desk & Onsite Support
90% of attacks can be prevented by keeping your system fully up to date. Source: Sophos
Barracuda Next-Generation Firewall
What happened in 2013 1. Breaches Increase in security breaches 3. Malware Use of malware and root kits continues to rise 2. The Cloud SMB’s continue to migrate to cloud-based applications 4. Mobile Users 1 in 10 remote users infected 1 million New iPhone and Androids Daily
Security Concerns Targeted Attacks Personal and Private Information Advanced Persistent Threats Denial-of-Service Drive-by Downloads
New Technology Challenges Mobile Devices The Cloud Social Media Sites Bandwidth Utilization Application Control
Same Resource Constraints Limited IT Staff Limited Budgets New Compliance Requirements
Barracuda Next-Generation Firewall Central Cloud Management Best-of-Breed Security Fixes UTM Performance Issues Total Cost of Ownership
Dynamic Link Management Balance traffic over multiple Internet links Automated Failover Failover, Round Robin, or Weighted balancing available ISP 1 60% of HTTP ISP 2 20% of HTTP ISP 3 20% of HTTP
Site-to-Site/Remote User Connectivity IPsec Site -toSite VPN Client-to-Site VPN IPsec, PPTP, SSL SSL VPN*: BFW X200 and higher SSL VPN Internal Corporate Resources
Cloud Offload User, URL, AV, reporting
The Solution in Action
Paulsoboro School District 25,000 concurrent users K-12 3 sites Barracuda Firewall x600
Looking Ahead… Barracuda Firewall v6.5 - April 2014 • Revamped Interface • Local Web-Filtering • Improved Application Awareness
Questions James Tolosa Jtolosa@barracuda.com
Questions & Answers Phillip Long, CEO Business Information Solutions Inc. 251.923.4027 firstname.lastname@example.org James Tolosa, Security Product Manager Barracuda Networks Inc.
Special Offer Contact: Phillip Long, CEO 251.923.4027 email@example.com FREE, NO STRINGS ATTACHED Network Evaluation
Fill Out the Survey & Be Entered to Win a Gift Card to:
Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...
In this presentation we will describe our experience developing with a highly dyna...
Presentation to the LITA Forum 7th November 2014 Albuquerque, NM
Un recorrido por los cambios que nos generará el wearabletech en el futuro
Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...
If any security breach happened, ... BIS "Is Your Company at Risk for a Security Breach?" 344 Views. qmatheson.
BIS "Is Your Company at Risk for a Security Breach?" Protecting Consumer Information: Can a Breach be Prevented? Security Breach Laws.
... Risk & Security Assessments In the IT space, ... BIS "Is Your Company at Risk for a Security Breach?" 344 Views.
BIS "Is Your Company at Risk for a Security Breach?" Login or Join. Processing Login successful.