lenovo presentation for sys logic lunch and learn
TRANSCRIPT
![Page 1: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/1.jpg)
Welcome to the Q4 Kick-off Lunch & Learn
![Page 2: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/2.jpg)
AboutToday, Lenovo is a
1. US$39billion personal technology company. 2. A global Fortune 500 company.3. Founded in China as Legend Holdings Co. in 19814. Changed Name to Lenovo in 1988 and acquired PC Division from IBM.5. 54,000+ employees.6. 60+ countries.7. Worlds Largest PC Maker.8. 4th Largest Smartphone Company.9. Serving customers in more than 160 countries. 10. Headquartered in Hong Kong with largest operational centers in Beijing and Morrisville, NC.
![Page 3: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/3.jpg)
David Coady Channel Account Manager
David Coady is one of Lenovo's two Channel Account Managers here in Texas. He is in his first year with Lenovo but has been involved in technology channel sales in North Texas for the last twelve years. He is the main point of contact for Sys Logic for all Lenovo products and is supported by product specialists. He lives in Denton, TX, with his wife Julie and they are the parents of three boys.
![Page 4: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/4.jpg)
![Page 5: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/5.jpg)
Yoga Laptop
AMERICA'S BEST SELLING CONVERTIBLE 2-IN-1 PC Processor - 4th Generation Intel® Core™ Processors Operating System - Windows 8.1 64-bit Operating System Display - 12.5” FHD Display Rotates 360° Business Power - Tackle Business Your Way with Four Usage Modes Ultrabook - Legendary THINK Reliability & Business Features
![Page 6: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/6.jpg)
![Page 7: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/7.jpg)
X1 Carbon
PROFESSIONAL REDEFINED Processor - 4th Generation Intel® Core™ Processors Operating System - Windows 8.1 64-bit Operating System Display - Thin & Light Carbon with Carbon Fiber Durability Keyboard - Adaptive Keyboard That Changes with Apps Battery Charge - RapidCharge Battery - 80% Charge Within an Hour
![Page 8: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/8.jpg)
![Page 9: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/9.jpg)
TD/RD ServersBALANCED DESIGNOUSTANDING EFFICIENCY Processor - Intel® Xeon™ E3 Series Processors Operating System - Windows Server 2012 R2 Platform Business Power - Highly-Efficient, Dense, 1U, Rack Server Professional - Right Blend of Performance, Memory & I/O Professional - Perfect for Mainstream & Virtualized Workloads
![Page 10: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/10.jpg)
![Page 11: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/11.jpg)
ThinkServer SA120 Direct Attached StorageThinkServer SA120ThinkServer SA120 provides versatile, high density direct attached storage that’s ideal for small businesses, distributed enterprises or datacenters.
![Page 12: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/12.jpg)
![Page 13: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/13.jpg)
Tony DeGoniaDirector of Marketing
Tony is the Director of Marketing for Sys Logic Technology Services. Tony has been in the IT Industry for the last 20 years 10 of which have been in East Texas with companies he has owned and as the VP and General Manager of a major competitor before leaving in June 2013. Tony lives in Wills Point with his wonderful wife Cayse and their three children.
![Page 14: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/14.jpg)
The Top 3 Things To Do To Secure Your Small Business Network.
![Page 15: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/15.jpg)
Hacker News
![Page 16: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/16.jpg)
cy-ber-at-tack [sahy-ber-uh-tak] - noun
an attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network.
![Page 17: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/17.jpg)
Shellshock is the latest online threat sent to disrupt us. It's a loophole that affects a piece of software called Bash found mainly in Linux® or Unix® operating systems as well as the Apple®
MacOS® X. And while the Shellshock bug is more about web servers and other Internet devices,
those can now be turned against your own, more personal devices.
What is Shellshock?
Active Threats
![Page 18: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/18.jpg)
Active Threats
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
![Page 19: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/19.jpg)
Hackers Can Access Admin Panel of Some Netgear and
Linksys Routers
Hacker Headlines
January 2014
![Page 20: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/20.jpg)
Home Depot Confirms Hack; Cyber Attack Could Affect
Customer Credit CardsSeptember 2014
Hacker Headlines
![Page 21: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/21.jpg)
More retailers reportedly hit by cyber attacks – Target,
Neiman MarcusDecember 2013
Hacker Headlines
![Page 22: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/22.jpg)
2014 Cyber Attacks
![Page 23: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/23.jpg)
Cyber Attack Statistics
![Page 24: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/24.jpg)
For law enforcement agencies, the IC3 serves as a conduit to receive Internet-related complaints, to conduct research related to them and to develop analytical reports for state, local, federal, tribal or international law enforcement and regulatory agencies.
FBI – IC3
![Page 25: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/25.jpg)
In 2013, the IC3 received 262,813 consumer complaints with an adjusted dollar loss of $781,841,6111, which is a 48.8 percent increase in reported losses since 2012 ($581,441,110).
FBI – IC3
![Page 26: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/26.jpg)
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 20130
50000
100000
150000
200000
250000
300000
350000
400000
75064
124449
207492231493
207492 206884
275284
336655
303809314246
289874
262813
Yearly Totals – Cyber Attack Complaints
![Page 27: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/27.jpg)
262,813
119,457
$781,841,611
Total Losses - 2013
Total Number of Complaints Filed.
Number of Complaints with a Monetary Loss.
Total Monetary Value of Complaints Filed.
![Page 28: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/28.jpg)
Someone is Messing with Texas
1. California2. Florida
3.Texas4. New York5. Pennsylvania6. New Jersey7. Illinois8. Virginia9. Ohio10. Georgia
![Page 29: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/29.jpg)
How Many People In This Audience Feel They Take a Proactive Security Approach To Their Small Business Network Security?
Question?
![Page 30: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/30.jpg)
Compliance
This is the scariest word in a business owners vocabulary
![Page 31: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/31.jpg)
Compliance
![Page 32: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/32.jpg)
3 Step Approach To Security
1.Active Security Approach2.Active Maintenance Approach3.Active Policy Approach
![Page 33: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/33.jpg)
Active Security Approach
![Page 34: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/34.jpg)
Active Security Approach
1. Firewall - Deploy Firewalls with MULTI-LAYERED PROTECTION on every external network (internet) connection.
Web Blocker
spamBlocker
Reputation Enabled Defense
Packet Filtering
Live Security
Intrusion Prevention
Gateway Anti-Virus
Data Loss Prevention
APT Blocker
Application Control
![Page 35: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/35.jpg)
Active Security Approach
![Page 36: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/36.jpg)
Active Security Approach
2. WiFi Security – WPA2 with AES Encryption. WEP IS DEAD.
![Page 37: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/37.jpg)
Active Security Approach
3. Authentication – Auditable standards are met for all required compliances.
![Page 38: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/38.jpg)
Active Security Approach
4. SSL - 256bit AES SSL Certificates MUST installed on all servers, firewalls, websites and applications that will gather client PI (Personal Information).
![Page 39: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/39.jpg)
Active Security Approach
5. Licensing - All software licensing MUST active and legally acquired. A large percentage of security breaches occur through illegal or illegally licensed software. (Yes that includes Microsoft Software and Anti-Virus too).
1.888.NO.PIRACYhttps://reporting.bsa.org
Rewards Paid up to
$15,000,000
![Page 40: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/40.jpg)
Active Security Approach
6. BC/DR – Business Continuity and Disaster Recovery. Back It Up So It Will Be There When You Need It.
![Page 41: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/41.jpg)
Active Security Approach
1. Resilience2. Recovery3. Contingency
![Page 42: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/42.jpg)
Active Security Approach
Firewall - Deploy Firewalls with MULTI-LAYERED
PROTECTION on every external network (internet)
connection.
WiFi Security - WPA with AES Encryption.
WEP IS DEAD.
Authentication – Auditable standards
are met for all required compliances.
SSL - 256bit AES SSL Certificates MUST installed on all servers,
firewalls, websites and applications that will gather
client PI (Personal Information).
![Page 43: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/43.jpg)
Active Security Approach
![Page 44: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/44.jpg)
Active Maintenance Approach
![Page 45: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/45.jpg)
Active Maintenance Approach
1. Updates – Every device in a SMB Network requires updates and should be updated regularly through a standardized update procedure that tests the updates before deployment for both software and firmware. NO UPDATES = BAD NEWS. AUTOMATED UPDATES = CATASTROPHE.
![Page 46: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/46.jpg)
Active Maintenance Approach
2. End-Points - (PCs, Servers, Tablets, Mobile Devices) MUST have active, updated anti-virus, anti-spyware and anti-malware software installed.
![Page 47: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/47.jpg)
Active Maintenance Approach
3. Access and Permissions – Access and Permissions Must be Set Per Compliance Requirement and Reviewed Monthly to Ensure That Only Necessary Permissions are Granted.
![Page 48: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/48.jpg)
4. File Sharing – Open File Sharing is Out. Securing File Sharing with Audit Trails is IN. Think BOX, OneDrive and SharePoint.
Active Maintenance Approach
![Page 49: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/49.jpg)
Active Maintenance Approach
5. Logging and Alerts – Every Device in the Network Creates Logs and are Capable of Creating of Alerts about predefined log types.
![Page 50: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/50.jpg)
![Page 51: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/51.jpg)
Updates – Every device in a SMB Network requires updates and should be updated regularly through a standardized update procedure that tests the updates before deployment for both software and firmware. NO UPDATES = BAD NEWS. AUTOMATED UPDATES = CATASTROPHE.
End-Points - (PCs, Servers, Tablets, Mobile Devices) MUST have active, updated anti-virus, anti-spyware and anti-malware software installed.
Access and Permissions – Access and Permission Rules Must be Reviewed Monthly to ensure past that only necessary permissions are granted.
File Sharing – Open File Sharing is Out. Securing File Sharing with Audit Trails is IN. Think BOX, OneDrive and SharePoint.
Logging and Alerts – Every Device in the Network Creates Logs and are Capable of Creating of Alerts about predefined alert types.
Active Maintenance Approach
![Page 52: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/52.jpg)
Active Policy Approach
![Page 53: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/53.jpg)
Active Policy Approach
1. IT Policy is a NECESSITY.
![Page 54: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/54.jpg)
2. Your Employees Do Not “Know What The Right Thing Is”.
Active Policy Approach
![Page 55: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/55.jpg)
3. Do Not Write Policy That Is Unenforceable.
Active Policy Approach
![Page 56: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/56.jpg)
4. Be Prepared to Enforce What You Write.
Active Policy Approach
![Page 57: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/57.jpg)
5. Make Sure Your Policy Covers Your Compliance Needs.
Active Policy Approach
![Page 58: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/58.jpg)
Active Policy ApproachIT Policy is a NECESSITY.
Your Employees Do Not “Know
What The Right Thing Is”.
Do Not Write Policy That Is
Unenforceable.
Be Prepared to Enforce What You
Write.
Make Sure Your Policy Covers Your
Compliance Needs.
![Page 59: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/59.jpg)
Does Your Computer Company Make A Difference?
We Do.
![Page 60: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/60.jpg)
![Page 61: Lenovo Presentation for Sys Logic Lunch and Learn](https://reader035.vdocuments.us/reader035/viewer/2022070600/589e60d01a28ab1a548b479f/html5/thumbnails/61.jpg)
Conclusion.
Any Questions?
www.syslogic-techsvc.com