Business is hard!
Doing business is complicated!
Keeping your business head above water is a never ending struggle.
I know, I am there too!
I’m probably not telling you anything that you didn’t already know.
Your organisation is under threat from so many quarters, both seen and unseen.
Cash flow, marketing, sales, manufacturing to name just a few.
What about digital security – have you got that covered or is it another part of the overall business problems that you face?
Anything for gratis, that delivers great business insight, should be good.
Let me show you how to manage the complexity of the digital security world.
Show you how small and medium business and not for profit organisations can protect themselves.
This one hour webinar, the second in the series, will show you how using my simple and easy to understand digital security framework can help secure your digital assets.
No sales Hype!
No vendor “Buy this cause it is the best CRAP!”
This webinar looks at how your focus on technology is as important as the other three components.
We will be discussing hardware, software, AV, authentication, encryption, patching and best practice.
This is a brief look at using this framework to protect your organisation.
This is the second webinar in the series. A recording of the first one is HERE.(https://youtu.be/3_DgLzExAVc)
Sign Up HERE, Thursday 3/12/2015 1130 Australian Eastern Daylight Saving Time. (http://gowoa.me/i/SSsS)
Roger Smith is the CEO of R & I ICT Consulting Services, Amazon #1 selling author on Cybercrime, author of the Digital Security Toolbox and author of the SME Digital Security Framework. Rapid Restart Appliance Creator. He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world.
Here is a synopsis of the webinar
- Quick introduction
- Why we need a framework for small and medium business and NfP
- Quick look at the framework
- Using the CIA – the importance of the DATA
- Let’s focus on the technology component
- Perimiter Defence – north south compared to east west
- Next generation defences
- intrusion detection
- UTM – unified threat management
- APT – advanced persitant threats
- Newest systems v’s oldest systems – legacy systems
- Smart devices
- Operating systems
- Anti Virus
- Why we still need it
- What do we need it for
- End point protection / AV, malware, spyware
- Username and passwords
- Default passwords
- Why we need to employ it
- In transit
- At rest
- VPN / WiFi
- Dos and don’ts
- System management
- Data seperation
- Flat network
- Users and data
- Best practice
- Why we need them
- What are they
- What do they do