• No results found

A HELPING HAND TO PROTECT YOUR REPUTATION

N/A
N/A
Protected

Academic year: 2021

Share "A HELPING HAND TO PROTECT YOUR REPUTATION"

Copied!
12
0
0

Loading.... (view fulltext now)

Full text

(1)

OVERVIEW

SECURITY SOLUTIONS

A HELPING HAND

TO PROTECT YOUR

(2)

INFORMATION SECURITY MATTERS

01

TAKE NOTE!

02

LAYERS OF PROTECTION

04

ON GUARD WITH OPTUS

05

THREE STEPS TO SECURITY PROTECTION

06

WE WANT TO HELP YOU EVERY STEP OF THE WAY

08

(3)

INFORMATION

SECURITY MATTERS

Emerging technologies have helped

organisations, particularly SMEs, to work

smarter and to create new business

opportunities. But these technologies

have also created new risks. There is

now increased potential for IT security

breaches and misuse of customer data

– with the associated risk of to your

company’s reputation and brand.

The Optus Future of Business Report 2013 revealed that organisations are expanding the way they connect with customers. Social networks and devices such as tablets and smartphones are driving greater social and digital integration. This highlights the need to have up-to-date, context-aware firewalls and endpoint security.

Security is a core part of any conversation about cloud, social media, mobility and data centre transformation. Given the high profile of these market trends, security should be at the forefront of CIO’s minds.

Also, organisations have obligations under the Privacy Act 1988 to put in place reasonable security safeguards and to take reasonable steps to protect the personal information that they hold.

In June 2013, a new mandatory data breach notification bill was tabled in the Senate. It requires organisations to notify the Privacy Commissioner and affected consumers when a data breach occurs. Fines could be imposed on organisations and individuals. This would make the need to adopt a robust IT security architecture even more important.

60%

RESPONDED THAT DEVELOPING

A STRATEGY FOR IMPROVING

SECURITY AND RISK MITIGATION

WAS HIGH TO CRITICAL PRIORITY.

THE AUSTRALIAN STATE OF THE

CIO STUDY 2013

(4)

A RECENT DATA BREACH INVESTIGATION REPORT HIGHLIGHTS

SOME STARTLING FINDINGS:

TAKE NOTE!

Source: 2013 DATA BREACH INVESTIGATIONS REPORTverizonenterprise.com/DBIR/2013

69%

OF BREACHES WERE SPOTTED

BY AN EXTERNAL PARTY

WERE SPOTTED

BY CUSTOMERS

SOCIAL TACTICS

USING EMAIL, PHONE CALLS

AND SOCIAL NETWORKS TO GAIN

INFORMATION ON INDIVIDUALS

ARE

OFTEN IGNORED, BUT

CONTRIBUTED TO 29% OF

ATTACKS

66%

OF BREACHES TOOK MONTHS OR

EVEN YEARS TO DISCOVER

29%

9%

(62% MONTHS,

(5)

More than ever before, businesses

are facing external threats that can

compromise their business. Security

threats are not only growing but are

more complex and sophisticated.

The bring-your-own-device (BYOD)

trend is increasing exposure to

vulnerabilities, because many

organisations are adopting a mixed

personal and business-use device

policy.

These factors are coupled with the

imperative to protect data privacy,

data security and intellectual property.

TOP OF MIND

CONCERNS

OVER HALF OF THE

INSIDERS COMMITTING

SABOTAGE WERE

FORMER EMPLOYEES

TAKING ADVANTAGE

OF OLD ACCOUNTS

OR BACKDOORS THAT

WEREN’T DISABLED

76%

OF NETWORK INTRUSIONS

EXPLOITED WEAK OR STOLEN

CREDENTIALS. STRICT POLICIES

ARE REQUIRED TO REDUCE THIS

EASILY PREVENTABLE RISK.

CUSTOMER

DATA AND IP

MIXED USE BYOD

CYBER THREATS

(6)

LAYERS OF

PROTECTION

Organisations need to adopt a multi-layered,

holistic approach to manage today’s threat landscape. You need to identify the critical assets that need protecting, and the levels of protection required. This helps you understand the level of security necessary across different parts of the organisation.

Optus believes that a proactive security posture is necessary to prevent data loss — this strategy should encompass people, processes and technology.

PROCESS

Application and

Process Security

PEOPLE

People and Identity

Security

DATA

Data and Information

Security

TECHNOLOGY

Network and

Infrastructure

Vulnerability Assessment and Penetration T

esting

Application & Web Application Security

Identity Authentication

Email, Web and Data security

Distributed Denial of Service

Mitigation (DDoS)

Intrusion Detection and Prevention

Firewall / Secure remote access

Network

Security Policy and Information Event

Management Monitoring and Reporting

(7)

ON GUARD

WITH OPTUS

OPTUS’ SECURITY SERVICES

ENCOMPASS

• FIREWALLS

• INTRUSION PREVENTION

• WEB, EMAIL AND INFORMATION CONTENT

SECURITY

• ENDPOINT PROTECTION

• DISTRIBUTED DENIAL-OF-SERVICE

PREVENTION

• VULNERABILITY ASSESSMENTS

• SECURITY EVENT MANAGEMENT.

Our monitoring services provide rapid detection of security incidents and vulnerabilities for proactive remediation.

NETWORK

SECURITY

CONTENT

SECURITY

ENDPOINT

SECURITY

HOW DO I CONNECT SAFELY

TO THE WEB?

• Firewall/intrusion prevention/SSL VPN • Remote SSL VPN

• Authentication./access management

HOW DO I DEAL WITH THE SOCIAL

MEDIA TREND?

• Email, web and data content security • Secure web gateway

• Application security

HOW DO I DEAL WITH THE

BYOD TREND?

• Mobile device security

• Data loss prevention and protection • Data encryption

• Anti-malware/SPAM protection

(8)

A BUNDLE FOR

SECURITY PROTECTION

We can help you on your security journey to protect your brand and reputation.

SECURITY PROTECTION

ASSESS YOUR RISK WITH A

VULNERABILITY ASSESSMENT

Automatic vulnerability scanning of online traffic coming into and leaving the customer internet gateway. Using a network connected appliance, this is a non-intrusive span TAP/ mirror port on the network

Customers can expect:

• Vulnerability assessment report • Risks and recommendations report At NO charge*

* Vulnerability Assessment is based on Optus’ Introductory Online Cyber Threat Vulnerability Assessment Service.

UTILISE LOW COST AND

RELIABLE OPTUS UECOMM

INTERNET FOR CONNECTIVITY

Fast, secure internet service is essential to modern business:

• Permanent, reliable internet connection with static IP addresses • Supported by Optus Uecomm

Ethernet VPN service

• Choice of bandwidth you want from a range of access services

• Bandwidth scalable as your business grows

• Detailed reporting capability to manage growth.

PROTECT YOUR BUSINESS WITH A

MANAGED SECURITY SERVICE

Choose from a variety of managed security solutions including:

• Firewall/intrusion prevention/ SSL VPN

• Remote access security/SSL VPN • Authentication and access

management (IAM) • Email, web and data; hybrid

secure gateway and cloud • Mobile device security/ endpoint

security

• Application security management/ load-balancing • Security event management/

(9)

A RISK AND VULNERABILITY ASSESSMENT

CAN HELP YOU UNDERSTAND YOUR CURRENT

SECURITY POSTURE AND GUIDE YOU TO A

SECURITY IMPROVEMENT PLAN THAT HAS THE

RIGHT BALANCE BETWEEN EXPENDITURE AND

RISK EXPOSURE.

We can help you start your journey towards

greater protection if:

• Your lines of defence are compromised • Your existing security measures aren’t

addressing current risks or

• There are weaknesses in your IT security defences

Early detection enables you to proactively

reduce risk exposure. Optus’ security

assessment services include:

• Security policy review; roles and

responsibilities

• Network vulnerability assessment (external and internal)

• Penetration testing

• Report and remediation proposal • On-going periodic automated monitoring

and reporting

(10)

WE WANT TO HELP YOU

EVERY STEP OF THE WAY

CONSULTING SERVICES

We’ll help to identify critical ICT security risks and recommend appropriate controls to better protect your people, customers, information, processes and technology.

ARCHITECTURE DESIGN SERVICES

We design and architect networks to secure and protect the confidentiality, integrity and availability of information that traverses the network and systems infrastructure.

SOLUTION DEPLOYMENT

We’ll ensure the scope of the project meets your ICT environment and seamlessly integrates your critical functions to meet the configurations required. Solutions can be applied with varied levels of control to help you find the mix that is right for your environment, risk appetite and security strategy.

ONGOING MANAGEMENT

We’ll maintain vigilance over your defences around the clock with our 24 x 7 monitoring and response capability. From our Network Operations Centre we monitor your network within response times that meet your requirements.

(11)

CHECKOUT OUR

ONLINE VIDEOS

FROM UPDATING FIREWALLS TO ASSESSING

YOUR ORGANISATIONS VULNERABILITY

EXPOSURE.

Reducing security complexity yesopt.us/reducingcomplexity Updating firewalls

yesopt.us/updatingfirewalls Securing your online presence yesopt.us/onlinepresence

Remote access to corporate networks yesopt.us/accessnetworks

4 steps you should take yesopt.us/4steps

WE OFFER PROFESSIONAL

SERVICES TO GIVE YOU PEACE

OF MIND WHEN ADOPTING A

SECURITY NETWORK.

(12)

© 2013 SingTel Optus Pty Limited. OBN0174 1213KD

innovative communications solutions;

contact your Optus Account Manager or call the Optus Business hotline on 1800 555 937

JOIN THE CONVERSATION

Web optus.com.au/business

Twitter @optusbusiness

References

Related documents

son is convicted of "felony drunk driving" and the offense oc- curred within five years of a previous conviction for either felony or misdemeanor drunk

Examination and working test of the main steering arrangements, including their associated equipment and control systems. Confirmation that the emergency instructions

Prima imagine sau icoană este cea naturală – așa cum Fiul este o imagine a lui Dumnezeu Tatăl, așa încât să poate afirma „Cine M-a văzut pe Mine a văzut pe Tatăl” (In

Your Personal Projection Based on our best estimate of your annual usage and your current prices, including VAT and any discounts, we estimate your Personal Projection of costs for

Best Company Coverage is available for employment practices, general liability (personal injury), hired and non-owned automobile liability, crime and special events. A

If you or your children are eligible for Medicaid or CHIP and you’re eligible for health coverage from your employer, your state may have a premium assistance program that can help

 Most homeowners insurance policies do not offer liability coverage or property damage protection when the boat is used off of the customers property.... • The

In 2013, the estimated yield loss from this disease was over 13 million bushels (ranked 6 of 14 foliar diseases) in the United States and Ontario, Canada (Mueller et al..