security update abuse: don t push your luck · you simply cant afford to run around puttin out res....

4
L ook around your office. Isn’t it great to see your team hard at work on their computers? Yet if we take a closer look, let’s see what’s really happening… Joe, your new sales rep, is poring over last weekend’s game stats… Amy in marketing is looking for a new job, surfing your competitors’ websites, chatting with their HR people… Wes, over in customer support, just bogged down your entire network by downloading a video file of Metallica in concert… Guy, your new hire in shipping, is on hotdate.com, viewing questionable photos… Bob in accounting is browsing stock- investing sites, in search of a hot tip… Okay, so maybe it’s not that bad at your company. But this type of behavior will happen to some degree if you don’t proactively prevent it. The real problem is, unfiltered content often links to malware and other threats. Ignore it and you risk productivity losses, legal liabilities, extortion, blackmail and fraud. And not only that, the resulting data loss and corruption can cost your company big-time. Cyberthreats stemming from unfiltered content aren’t something you can count on your lucky leprechaun or four-leaf clover to protect you from. In today’s mobile environment, content filtering has become a greater challenge than ever before. Your company may already be doing some filtering at the network level. However, when was the last time you checked the number of mobile devices linked to your network? As your workforce goes mobile, your network is continued pg.2 Network Abuse: Don’t Push Your ‘Luck’ & y t i r u c e s k r o w t e n a s i P R E e r u c e S l a r t n e c n i t s i l a i c e p s n o i t a r g e t n i P R E f o s r a e y 5 2 r e v o h t i w a n a i d n I o t l l a m s g n i t r o p p u s e c n e i r e p x e y b d e d n u o F . s e s s e n i s u b d e z i s m u i d e m y t i r u c e s d e i t r e c s o h p o S & A P C a s i P R E e r u c e S , t c e t i h c r a / r e e n i g n e & y t i r u c e s s t n e i l c r u o o t d e t a c i d e d . s e v i t c e j b o h t w o r g u o y c i m e d i p e s u r i v e h t s i e r a w m o s n a R . r e t n i w s i h t h c t a c o t t n a w t ' n o d n o i l l i M 4 2 s e s s e n i s u b t s o c e r a w m o s n a R t u b , r e b m u n l l a m s o n s t a h T . 5 1 0 2 n i s r a l l o d . s r a l l o d n o i l l i b e n o d e t c e j o r p a s t i 6 1 0 2 n i n a s t a h T . s r a l l o d N O I L L I B e n o d i a s I , s e Y o t 6 1 0 2 d e t c i d e r p I . % 0 0 0 4 r e v o f o e s a e r c n i t c i d e r p I d n a e r a w m o s n a R f o r a e y e h t e b . e s r o w e b l l i w 7 1 0 2 s u r i v - i t n a e v a h u o Y ? t h g i r , d e t c e t o r p e r u o Y f I . G N O R W . t i p o t s l l i w t i d n a g n i n n u r ) V A ( d n e r T , e e f f A c M , y k s r e p s a K g n i n n u r e r u o y - e r u t a n g i s r e h t o n e z o d a r o , G V A , o r c i M f i t i p o t s y l n o l l i w t i , s t c u d o r p V A d e s a b a s a d D I n e e b s a h e r u t a n g i s r a l u c i t r a p t a h t f o s d e r d n u h e r a e r e h t s i e l b u o r T . y u g d a b r u o Y . y a d h c a e s e r u t a n g i s w e n f o s d n a s u o h t . p u p e e k t n a c V A d l o d e s s u c s i d t n s a h l a n o i s s e f o r p T I r u o y f I a o t V A d e s a b - e r u t a n g i s r u o y g n i g n a h c e m i t s t i s p a h r e p n e h t , V A d e s a b - l a r o i v a h e b r u o y t u p l l i w h c i h w m r T I n a r o f k o o l o t t u o d n i F . r e n r u b t n o r f e h t n o n o i t c e t o r p , d n e m m o c e r e w V A e h t t u o b a e r o m . m o s n a r o n / m o c . c n i p r e e r u c e s . w w w / / : p t t h e t a d p U y t i r u c e S y l h t n o m s i h T s i n o i t a c i l b u p d e d i v o r p k c i R f o y s e t r u o c f o O E C , h c s u R . c n I , P R E e r u c e S . d e v l o S s m e l b o r P s s e n i s u B l a e R , e r a w t f o S P R E t s u J t o N 2 0 7 8 - 0 9 2 ) 7 1 3 ( 7 1 0 2 h c r a M

Upload: others

Post on 03-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Update Abuse: Don t Push Your Luck · you simply cant afford to run around puttin out res. ou absolutely MUST proactively defend your network in depth wit endpoint content

Look around your office. Isn’t it great to see your team hard at work on their

computers? Yet if we take a closer look, let’s see what’s really happening…

Joe, your new sales rep, is poring over last weekend’s game stats…

Amy in marketing is looking for a new job, surfing your competitors’ websites, chatting with their HR people…

Wes, over in customer support, just bogged down your entire network by downloading a video file of Metallica in concert…

Guy, your new hire in shipping, is on hotdate.com, viewing questionable photos…

Bob in accounting is browsing stock-investing sites, in search of a hot tip… Okay, so maybe it’s not that bad at your company. But this type of behavior will happen to some degree if you don’t

proactively prevent it. The real problem is, unfiltered content often links to malware and other threats. Ignore it and you risk productivity losses, legal liabilities, extortion, blackmail and fraud. And not only that, the resulting data loss and corruption can cost your company big-time. Cyberthreats stemming from unfiltered content aren’t something you can count on your lucky leprechaun or four-leaf clover to protect you from.

In today’s mobile environment, content filtering has become a greater challenge than ever before. Your company may already be doing some filtering at the network level. However, when was the last time you checked the number of mobile devices linked to your network? As your workforce goes mobile, your network is

continued pg.2

Network Abuse:

Don’t Push Your ‘Luck’

& ytiruces krowten a si PRE eruceS lartnec ni tsilaiceps noitargetni PRE

fo sraey 52 revo htiw anaidnI ot llams gnitroppus ecneirepxe

yb dednuoF .sessenisub dezis muidem ytiruces defiitrec sohpoS & APC a si PRE eruceS ,tcetihcra/reenigne & ytiruces s’tneilc ruo ot detacided

.sevitcejbo htworg

uoy cimedipe suriv eht si erawmosnaR .retniw siht hctac ot tnaw t'nod

noilliM 42 sessenisub tsoc erawmosnaR tub ,rebmun llams on s’tahT .5102 ni srallod

.srallod noillib eno detcejorp a s’ti 6102 ni na s’tahT .srallod NOILLIB eno dias I ,seY ot 6102 detciderp I .%0004 revo fo esaercni

tciderp I dna erawmosnaR fo raey eht eb .esrow eb lliw 7102

suriv-itna evah uoY ?thgir ,detcetorp er’uoY fI .GNORW .ti pots lliw ti dna gninnur )VA(

dnerT ,eeffAcM ,yksrepsaK gninnur er’uoy -erutangis“ rehto nezod a ro ,GVA ,orciMfi ti pots ylno lliw ti ,stcudorp VA ”desab

a sa d ’DI neeb sah erutangis ralucitrap taht fo sderdnuh era ereht si elbuorT ”.yug dab“ ruoY .yad hcae serutangis wen fo sdnasuoht

.pu peek t’nac VA dlo

dessucsid t’nsah lanoisseforp TI ruoy fI a ot VA desab-erutangis ruoy gnignahc

emit s’ti spahrep neht ,VA desab-laroivaheb ruoy tup lliw hcihw mrfi TI na rof kool ot

tuo dniF .renrub tnorf eht no noitcetorp ,dnemmocer ew VA eht tuoba erom

.mosnaron/moc.cnipreeruces.www//:ptth

etadpU ytiruceS

ylhtnom sihT si noitacilbup

dedivorp kciR fo ysetruoc fo OEC ,hcsuR

.cnI ,PRE eruceS

.devloS smelborP ssenisuB laeR ,erawtfoS PRE tsuJ toN 2078-092 )713(

7102 hcraM

Page 2: Security Update Abuse: Don t Push Your Luck · you simply cant afford to run around puttin out res. ou absolutely MUST proactively defend your network in depth wit endpoint content

Free Report: What Every Small Business Owner Must Know About Protecting And Preserving Their Company’s Critical Data And Computer Systems

This report will outline in plain, non-technical English common mistakes

that many small business owners make with their computer network that

cost them thousands in lost sales, productivity and computer repair bills,

as well as providing an easy, proven way to reduce or completely eliminate the financial expense and frustration caused by these oversights.

exposed to a rapidly expanding “attack surface.” With BYOD (bring your own device) now the norm, the old rules of content filtering just don’t cut it anymore.

Are You Making Any Of These Mistakes?Old content-filtering models presume your network has a safe “firewall.” But now, with BYOD, you need a different way to protect your data. And that’s where endpoint security comes into play. Endpoint filtering keeps devices on your network safe from infection, no matter where they hook into the Internet.

But make ANY of the following mistakes with endpoint security and your network could be a sitting duck:1. Missing even ONE endpoint.This applies to tablets andsmartphones as well as home-based machines that VPN intoyour network.

• Protect against leaks ofconfidential information.

• Encrypt structured andunstructured data in cloudplatforms.

• Investigate suspicious usersand incidents.

Between BYOD and ever more complex cyberthreats, you simply can’t afford to run around putting out fires. You absolutely MUST proactively defend your network in depth with endpoint content filtering.

2. Skimping on securitypolicies, protocols andtraining. Believing that techtools alone will keep yournetwork secure is a recipe forbreaches. In fact, no technologycan keep a network safe if userscut corners.

3. Leaving endpoint filteringout of your overall securityplan. Ad hoc security invitesdisaster. An improperlydesigned system exposes holesthat hackers love to find.

So, What Exactly Should You Filter?Forrester Research states that companies whose users access the cloud should:• Detect and

intercept unusual or fraudulent activities related to data in the cloud.

• Detect, neutralize andeliminate malware in cloudplatforms.

• Detect and monitorunsanctioned cloudapplications and platformsusage.

Are You Making Any Of These

Mistakes?

.devloS smelborP ssenisuB laeR ,erawtfoS PRE tsuJ toN 2078-092 )713(

PRE eruceS morf noitacilbup ylhtnom a ,semiT rebyC

er’ew ,hcraM fo htnom eht gniruD retsasiD/pukcaB EERF a gnireffo

yna rof tiduA yrevoceR htiw ynapmoc ortem silopanaidnI

a dna sretupmoc erom ro 01 ruoy ot emoc ll’eW .revres krowten

etelpmoc a tcudnoc dna ecfifo ,krowten retupmoc ruoy fo weiver

dna erawdrah dna erawtfos ,atad uoy evig neht ll’eW .krow uoy woh tuoba sthgisni dna srewsna lufpleh

rof ssenderaperp retsasid latigid ro tsoc on ta lla – ssenisub ruoy

.uoy ot noitagilbo

retsasiD/pukcaB eerf ruoy mialC ta yadot tiduA yrevoceR

tidua-rdb/moc.cnipreeruces.www .2078-092-713 ta llac a su evig ro

7102 hcraM

ruo llac ro tcetorp/moc.cnipreeruces.www ta yadot ypoc EERF ruoy daolnwoD .2078-092 )713( ta eciffo

Page 3: Security Update Abuse: Don t Push Your Luck · you simply cant afford to run around puttin out res. ou absolutely MUST proactively defend your network in depth wit endpoint content

What To NEVER Do When Deciding

Robert Stevenson is a highly sought after, internationally known speaker. He is the author of the best-selling books How to Soar Like An Eagle in a World Full of Turkeys and 52 Essential Habits For Success. Robert is a graduate of the Georgia Institute of Technology (Georgia Tech) and is a former All-American Athlete. He started his first business at 24 and has owned several companies. Robert has international sales experience dealing in over 20 countries, and his client list reads like a Who’s Who in Business. He has shared the podium with such renowned names as Generals Colin Powell and Norman Schwarzkopf, Former President George H.W. Bush, Anthony Robbins and Steven Covey. www.robertstevenson.org

We all have to make decisions every day. Some decisions we make require little thought and the consequences will not be earth-shattering or career-changing. But there are other decisions we have to make that can have an enormous impact on our lives.

A while back, I had to make a very big decision. I sought out counsel from people I respect and I measured all the pros and cons. I tried to consider all the “What ifs” and I assessed the consequences of doing it or not doing it. I received advice that ranged from “You should absolutely take the offer, no questions asked” to “No way take the offer, it’s not in your favor.” I’d been working toward this goal for several years, and when the offer came in writing…I turned it down.

So, what pushed me to say “NO” to the offer? What really helped me decide were two things. The first thing was there was a huge “What if” question that had a very bad result, if all didn’t go well. The second thing was a statement they made: “This is our standard agreement that is non-negotiable.” Everything in business is negotiable, and they just told me it isn’t. That one statement made me start reevaluating everything…and to finally make a decision to say “NO.”

I started thinking that once we began doing business together, what else was going to be “non-negotiable”? That one statement triggered me to start considering alternatives, options, other possibilities and a

new direction I could pursue if I said “NO” to their offer. I felt reenergized, stimulated, excited about the other options, and, even more surprising to myself…I was feeling no remorse about saying “NO.”

Who is to say I made the right or wrong decision? Some people might say, “Only time will tell,” but I still have a great deal to do with…the story that will be told. In all my years in business, I have learned two very important things about making decisions.

Ask yourself if you can live with the consequences if it fails…because if you can’t live with it, don’t do it.

NEVER doubt your decision, NEVER look back, NEVER SECOND-GUESS…because if you do, those actions will help to sabotage your decision.

My job now is to make my new direction the right direction, the right choice, the right decision. You should never make a decision because it is the easiest thing to do, nor should you make it based on convenience, and, most importantly, never “second-guess” the decision you made.

Former President Harry S. Truman once stated: “Once a decision was made, I didn’t worry about it afterward.” I would recommend we all follow his advice; I know I do.

secivreS uoY roF dereffO

YTIRUCESREBYC

rof nrecnoc dnim fo pot ruo s'tI .ytiruces atad dna ssenisub ruoy

lanoisseforp TI tnerruc ruoy fI t'ndluohs ,ti tuoba gnikniht t'nsi

htiw ssenisub ruoy tcetorp uoy ?seod taht eno

YTIUNITNOC SSENISUB

nac ssenisub ruoy gnirusnE eno htiw stser won eunitnoc .pukcab ruoy ,eruliaf fo tniop

pukcab gnorw eht gnivaH ruoy esaercni tsuj t'now

tuo uoy tup dluoc ti ,emitnwod .rehtegotla ssenisub fo

GNITNUOCCA PRE

SNOITULOS

deen sessenisub gnirutcafunaM elbane ot gnitnuocca PRE gnorts

tsurT .sevitcejbo htworg rieht sraey 02 revo s'rednuof ruo

ot smetsys PRE htiw ecneirepxe .oot APC a s'eh dna ,hO .pleh

hctam sevitcejbo ssenisub ruO

ssenisub ruoy gnipeek ,sruoy gnipleh dna ylhtooms gninnur

tsuj taht t'nseoD .worg ot uoy ?esnes ekam

ta su tcatnoC

-tuoba/moc.cnipreeruces.www ro su-tcatnoc/su

.2078-092 )713( ta ecfifo ruo llac

.devloS smelborP ssenisuB laeR ,erawtfoS PRE tsuJ toN 2078-092 )713(

PRE eruceS morf noitacilbup ylhtnom a ,semiT rebyC 7102 hcraM

Page 4: Security Update Abuse: Don t Push Your Luck · you simply cant afford to run around puttin out res. ou absolutely MUST proactively defend your network in depth wit endpoint content

Imagine careening through a virtual forest on the back of a Pegasus in a race against other fitness buffs... VirZOOM hopes their stationary, VR-equipped exercise bikes will soon be coming to an arcade or fitness center near you. They’ve already installed the bikes in over a dozen venues in the US, from Connecticut to California. Walk into any of these places and you can strap on a VR headset and compete in live, multiplayer matches. Plans are already being hatched for full-blown tournaments, complete with prizes and onlookers. You can ride your way to fitness with the aforementioned Pegasus, straight bike races or even a good old-fashioned tank battle… Who’d’a thunk doing something so good for your health could be so much fun? Engadget.com, 01.05.17

Uber has added a new destination: people. Let’s say you just flew into Phoenix and

you want to meet a friend there for drinks before heading to your hotel. It used to be that you’d ask them, “Where are you? … Where’s that again?” then try to quickly type in the address before you forgot any of the details, hoping you didn’t misspell anything. With Uber’s new “People” feature, instead of typing in your destination, you simply enter the person’s name, skipping all the back and forth. Uber then locks in their destination and directs the driver to take you there. It also sends your ETA to the person you’re going to see. Just sync your contacts with Uber before your next trip, and enjoy the ride. Mashable, 12.21.16

The Furbo Dog Camera lets you play with your pet from miles away. Missing your pup while you’re at work or on the road? Pull out your Android or iPhone and check in. Furbo delivers 720p video in a 120-degree field so you

see what’s going on at home. Call your dog through the microphone and even flip her (or him) a treat for responding to your command. Just swipe your phone’s screen in “Dispense” mode and Furbo launches a treat out onto the floor – or right into your dog’s mouth, if she’s clever enough to catch it. Furbo can be placed anywhere with an electrical outlet nearby. And with its sleek white hourglass design and bamboo wood top, it blends in with any decor. NerdTechy.com, 12.5.16

Introducing the mercenary software that powered Trump and Brexit. NationBuilder was built for any person or organization with a supporter or donor base who cares about what they’re doing. It helps activists cast their influence into the wider world via e-mail, social media and campaign website updates. Its goal is to convert interest into tangible support such as voting intent, monetary donations or volunteered time. Yet NationBuilder isn’t the only platform used by politicos to carry out their vision. Nor is it just for political or advocacy groups; in one case a woman used it to help raise money for her fiancé’s fight against cancer. What NationBuilder and other similar programs do is help people make a difference – no matter what their beliefs.DigitalTrends.com, 12.21.16

.devloS smelborP ssenisuB laeR ,erawtfoS PRE tsuJ toN 2078-092 )713(

PRE eruceS morf noitacilbup ylhtnom a ,semiT rebyC 7102 hcraM