keeping data safe in a hackers' world
DESCRIPTION
Quick tips to help safeguard your company’s network and data from security threats.TRANSCRIPT
![Page 1: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/1.jpg)
Presented by
Brad Artlip Kelsey Tarver
Keeping Data Safe in a Hackers’ World
![Page 2: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/2.jpg)
Who We Are
![Page 3: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/3.jpg)
Security Breaches in the News
![Page 4: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/4.jpg)
Tips to Safeguard
![Page 5: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/5.jpg)
Shrink the Attack Surface
![Page 6: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/6.jpg)
Implement Firewalls
![Page 7: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/7.jpg)
Disable Unnecessary Roles, Services, & Ports
![Page 8: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/8.jpg)
Segment Network to Limit Access
![Page 9: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/9.jpg)
Implement Encryption
![Page 10: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/10.jpg)
The Human Factor
➢ Use Strong Passwords
➢ Ensure Users Do Not Write Down Passwords
➢ Disable User Accounts Immediately Upon Leaving
➢ Secure Server Rooms, Work & Reception Areas
➢ Do Not Allow Unauthenticated Use of Network
➢ Do Not Allow Tailgating
![Page 11: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/11.jpg)
Avoid Social EngineeringHuman Traps
![Page 12: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/12.jpg)
Avoid Social EngineeringComputer-Based Traps
![Page 13: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/13.jpg)
Keep Up With Security Patches
![Page 14: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/14.jpg)
Security Vulnerabilities are High Priority
➢ Subscribe for OS Security Update Notifications
➢ Update Network Equipment
➢ Update PBX, Internet-Facing Systems, & Appliances
![Page 15: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/15.jpg)
Aventis Systems: Security Consulting ➢Assess Vulnerabilities
➢Perform Network Penetration
Tests
➢Assess Social Engineering Threats
➢Provide Security Best Practices
➢Train In-House Personnel
![Page 17: Keeping Data Safe in a Hackers' World](https://reader036.vdocuments.us/reader036/viewer/2022062709/55906b551a28ab4e488b4631/html5/thumbnails/17.jpg)
Thank You!www.AventisSystems.com