PROTECTING YOUR DATA
CHUCK STEPHENSON ALABAMA LEAGUE OF MUNICIPALITIES DIRECTOR, INFORMATION TECHNOLOGY
HISTORY:
• March 1971
• Number 1 songs - “One Bad Apple” by The Osmonds “Me and Bobby McGee” by Janis Joplin
• Number 1 Television show – “All in the Family” CBS History: Spring 1971 Fashion Trends HISTORY:
• Other events in March 1971 • Ray Tomlinson sends the first e-mail, the first messaging system to send messages across a network to other users. • Bob Bemer publishes world's first warning on Year 2000 problem in 1971. AND….. CREEPER
The first recorded computer virus was created by a co-worker of Ray Tomlinson, Bob Thomas.
Discovered March 16, 1971 RANSOMWARE (AIDS / PC CYBORG) 1989 ILOVEYOU VIRUS: MAY 5, 2000 JIBJAB “NAKED WIFE” VIRUS: MARCH 6, 2001 THREATS DEFINED
• Brute Force Password Attack • Malware • Phishing • Ransomware • Virus THREAT EVOLUTION: THREATS ARE INCREASING EXPONENTIALLY
Mostly due to the fact that Internet use is increasing exponentially. • IoT (Internet of Things) • Mobile Devices/Wearable technology • PCs, Cloud-computing, legacy devices… INTERNET EXPLOSION!
• According to a report from Cisco, annual global IP traffic passed the zettabyte threshold at the end of 2016, and is expected to reach 2.3 ZB per year by 2020. Gigabyte = 1,000,000,000 bytes Zettabyte = 1,000,000,000,000,000,000,000 bytes RECENT EVENTS
• Friday, May 12, 2017 • WannaCry Ransomware attack • Largest cyber exploitation attack WHAT’S THE TAB?
• IC3 – In the US over $1 billion annually • Cisco’s 2017 Annual Cybersecurity Report - found that one-third of the organizations that were subject of cyber attacks lost 20 percent of revenue or more. • McAfee - $400 billion annually globally
WHAT’S THE TAB?
• Cisco, in their 2017 Annual Cybersecurity Report found that 45 percent of the outages lasted from 1 to 8 hours; 15 percent lasted 9 to 16 hours, and 11 percent lasted 17 to 24 hours.
• Question: What would happen if you couldn’t do business for 1-3 days? CLOSER TO HOME…
•Licking County, Ohio - A ransomware virus attack.. CLOSER TO HOME…
•Cockrell Hill, Texas – another ransomware attack HOW DO YOU PROTECT YOUR DATA? WHERE ARE YOU VULNERABLE? 40%
35%
30%
25%
20%
15%
10%
5%
0% Phishing Scan & Exploit Strategic Web Credentials Removable Media Comprimise WHERE ARE YOU VULNERABLE?
• Most security incidents/breeches start with employees.
• Software updates/patches not applied.
• Firewalls not used. HOW CAN YOU STOP THEM?
• A multi-layered solution.
• Have a plan.
• It is not just an I.T. problem. Involve key leadership in the planning.
• These plans could also have a role in your business continuity plan. HOW CAN YOU STOP THEM? QUESTIONS?