start with security presentation - for sba 12-8-15-with notes · credit 8 finance 8 security...

34

Upload: others

Post on 04-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 2: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 3: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 4: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Don’t collect personal information you don’t need. 

Hold on to information only as long as you have a legitimate business need. 

Don’t use personal information when it’s not necessary.

Page 5: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 6: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Restrict access to sensitive data.

Limit administrative access. 

Page 7: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 8: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Insist on complex and unique passwords. 

Store passwords securely. 

Guard against brute force attacks. 

Protect against authentication bypass.

Page 9: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 10: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Keep sensitive information secure throughout its lifecycle. 

Use industry‐tested and accepted methods. 

Ensure proper configuration. 

Page 11: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 12: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Segment your network. 

Monitor activity on your network. 

Page 13: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 14: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Ensure endpoint security. 

Put sensible access limits in place. 

Page 15: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 16: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Train your engineers in secure coding. 

Follow platform guidelines for security. 

Verify that privacy and security features work. 

Test for common vulnerabilities. 

Page 17: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 18: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Put it in writing.

Verify compliance.

Page 19: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 20: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Update and patch third‐party software. 

Heed credible security warnings and move quickly to fix them. 

Page 21: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security
Page 22: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Securely store sensitive files. 

Protect devices that process personal information. 

Keep safety standards in place when data is en route. 

Dispose of sensitive data securely. 

Page 23: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

ftc.gov/datasecurity

Page 24: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

business.ftc.gov

Page 25: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

business.ftc.gov

Page 26: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

business.ftc.gov

Page 27: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

business.ftc.gov

Page 28: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

business.ftc.gov

Page 29: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

business.ftc.gov

Page 30: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

business.ftc.gov

Page 31: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

business.ftc.gov

Page 32: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

bulkorder.ftc.gov

Page 33: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security

Lisa Schifferle - [email protected]

Katherine McCarron - [email protected]

Page 34: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security