start with security presentation - for sba 12-8-15-with notes · credit 8 finance 8 security...
TRANSCRIPT
![Page 1: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/1.jpg)
![Page 2: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/2.jpg)
![Page 3: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/3.jpg)
![Page 4: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/4.jpg)
Don’t collect personal information you don’t need.
Hold on to information only as long as you have a legitimate business need.
Don’t use personal information when it’s not necessary.
![Page 5: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/5.jpg)
![Page 6: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/6.jpg)
Restrict access to sensitive data.
Limit administrative access.
![Page 7: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/7.jpg)
![Page 8: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/8.jpg)
Insist on complex and unique passwords.
Store passwords securely.
Guard against brute force attacks.
Protect against authentication bypass.
![Page 9: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/9.jpg)
![Page 10: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/10.jpg)
Keep sensitive information secure throughout its lifecycle.
Use industry‐tested and accepted methods.
Ensure proper configuration.
![Page 11: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/11.jpg)
![Page 12: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/12.jpg)
Segment your network.
Monitor activity on your network.
![Page 13: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/13.jpg)
![Page 14: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/14.jpg)
Ensure endpoint security.
Put sensible access limits in place.
![Page 15: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/15.jpg)
![Page 16: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/16.jpg)
Train your engineers in secure coding.
Follow platform guidelines for security.
Verify that privacy and security features work.
Test for common vulnerabilities.
![Page 17: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/17.jpg)
![Page 18: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/18.jpg)
Put it in writing.
Verify compliance.
![Page 19: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/19.jpg)
![Page 20: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/20.jpg)
Update and patch third‐party software.
Heed credible security warnings and move quickly to fix them.
![Page 21: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/21.jpg)
![Page 22: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/22.jpg)
Securely store sensitive files.
Protect devices that process personal information.
Keep safety standards in place when data is en route.
Dispose of sensitive data securely.
![Page 23: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/23.jpg)
ftc.gov/datasecurity
![Page 24: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/24.jpg)
business.ftc.gov
![Page 25: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/25.jpg)
business.ftc.gov
![Page 26: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/26.jpg)
business.ftc.gov
![Page 27: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/27.jpg)
business.ftc.gov
![Page 28: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/28.jpg)
business.ftc.gov
![Page 29: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/29.jpg)
business.ftc.gov
![Page 30: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/30.jpg)
business.ftc.gov
![Page 31: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/31.jpg)
business.ftc.gov
![Page 32: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/32.jpg)
bulkorder.ftc.gov
![Page 34: Start with security presentation - for SBA 12-8-15-with notes · CREDIT 8 FINANCE 8 SECURITY SELECTEO RESOURCES BUSINESS BIOG Business Center Your to taw START/ Q E-cURlTY WITH Security](https://reader034.vdocuments.us/reader034/viewer/2022050419/5f8f14d60341fa66ef384477/html5/thumbnails/34.jpg)