<<

PROTECTING YOUR DATA

CHUCK STEPHENSON ALABAMA LEAGUE OF MUNICIPALITIES DIRECTOR, INFORMATION TECHNOLOGY

HISTORY:

• March 1971

• Number 1 songs - “One Bad Apple” by “Me and Bobby McGee” by Janis Joplin

• Number 1 Television show – “All in the Family” CBS History: Spring 1971 Fashion Trends HISTORY:

• Other events in March 1971 • Ray Tomlinson sends the first e-mail, the first messaging system to send messages across a network to other users. • Bob Bemer publishes world's first warning on Year 2000 problem in 1971. AND….. CREEPER

The first recorded computer virus was created by a co-worker of Ray Tomlinson, Bob Thomas.

Discovered March 16, 1971 RANSOMWARE (AIDS / PC CYBORG) 1989 ILOVEYOU VIRUS: MAY 5, 2000 JIBJAB “NAKED WIFE” VIRUS: MARCH 6, 2001 THREATS DEFINED

• Brute Force Password Attack • Malware • Phishing • Ransomware • Virus THREAT EVOLUTION: THREATS ARE INCREASING EXPONENTIALLY

Mostly due to the fact that Internet use is increasing exponentially. • IoT (Internet of Things) • Mobile Devices/Wearable technology • PCs, Cloud-computing, legacy devices… INTERNET EXPLOSION!

• According to a report from Cisco, annual global IP traffic passed the zettabyte threshold at the end of 2016, and is expected to reach 2.3 ZB per year by 2020. Gigabyte = 1,000,000,000 bytes Zettabyte = 1,000,000,000,000,000,000,000 bytes RECENT EVENTS

• Friday, May 12, 2017 • WannaCry Ransomware attack • Largest cyber exploitation attack WHAT’S THE TAB?

• IC3 – In the US over $1 billion annually • Cisco’s 2017 Annual Cybersecurity Report - found that one-third of the organizations that were subject of cyber attacks lost 20 percent of revenue or more. • McAfee - $400 billion annually globally

WHAT’S THE TAB?

• Cisco, in their 2017 Annual Cybersecurity Report found that 45 percent of the outages lasted from 1 to 8 hours; 15 percent lasted 9 to 16 hours, and 11 percent lasted 17 to 24 hours.

• Question: What would happen if you couldn’t do business for 1-3 days? CLOSER TO HOME…

•Licking County, Ohio - A ransomware virus attack.. CLOSER TO HOME…

•Cockrell Hill, Texas – another ransomware attack HOW DO YOU PROTECT YOUR DATA? WHERE ARE YOU VULNERABLE? 40%

35%

30%

25%

20%

15%

10%

5%

0% Phishing Scan & Exploit Strategic Web Credentials Removable Media Comprimise WHERE ARE YOU VULNERABLE?

• Most security incidents/breeches start with employees.

• Software updates/patches not applied.

• Firewalls not used. HOW CAN YOU STOP THEM?

• A multi-layered solution.

• Have a plan.

• It is not just an I.T. problem. Involve key leadership in the planning.

• These plans could also have a role in your business continuity plan. HOW CAN YOU STOP THEM? QUESTIONS?