Introduction
  • Introduction
  • Frameworks
Physical Security- Hardware/Software/ Personnel
  • Is hardware/ software maintained internally
  • Hardware or software older than 5 years old
  • Is there an inventory of all equipment
  • Does the company know who report an incident to and the procedure to do so
  • A possible solution
Mobile Devices/ BYOD
  • Who owns the mobile devices used within the company
  • Are devices set to auto connect to Bluetooth and Wi-Fi networks
  • Is a VPN being used for remote access
  • VPN solution
Login/ Password
  • Can employees reset passwords / lock out owners
  • Does someone monitor login activity
  • SEIM solution for SMB
  • Is there a strict password creation and update policy in place
Website Social Media
  • Who has access and authorization to distribute web/social media content
  • Do all employees have web access and is it monitored?
Data Storage/ Backup
  • Does the company use cloud based backup services?
  • Are regulatory guidelines being followed (HIPPA, DoD, PCI)
Analyze the risk
  • What are the threats you face
Conclusion... what's next
  • Conclusion