CYBERSECURITY ISSUES

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

[Audio] CYBERSECURITY ISSUES. CYBERSECURITY ISSUES.

Page 2 (5s)

[Audio] Bank of New Hampshire Providing Professional, Quality, And Reliable Services To Clients BANKING WITH TRUST WE ARE THE BEST IN INVESTMENT AND SAVING YOU LIKE TO MAKE MONEY.

Page 3 (18s)

[Audio] WE HAVE THE SENSITIVE INFORMATION security plan is built on 5 key principles: 1 TAKE STOCK: Know what personal information you have in your files and on your computers. 2 SCALE DOWN : Keep only what you need for your business. 3. LOCK IT: Protect the information that you keep. 4: PITCH IT: Properly dispose of what you no longer need. 5. PLAN AHEAD: Create a plan to respond to securityincidents..

Page 4 (59s)

[Audio] TAKE STOCK Stock all PCs, workstations, cell phones, streak drives, plates, home PCs, computerized copiers, and other hardware to find out where your organization stores delicate information. Likewise, stock the data you have by type and area. Your file organizers and PC frameworks are a beginning, however, recall: your business gets individual data in various ways-through sites, from project workers, from call focuses, and such. Shouldn't something be said about data saved money on PCs, workers' home PCs, streak drives, computerized copiers, and cell phones? No stock is finished until you check wherever touchy information may be put away. .Track individual data through your business by conversing with your outreach group, data innovation staff, HR office, bookkeeping faculty, and outside specialist co-ops..

Page 5 (2m 2s)

[Audio] SCALE DOWN On the off chance that you don't have a real business need for delicate expressly recognizing data, don't keep it. Don't for even a moment gather it, truth be told. In the event that you have à genuine business need for the data, keep it just for however long it's fundamental. Utilize Social Security numbers just for required and legitimate purposes like announcing representative charges. Try not to utilize Social Security numbers superfluously for instance, as a worker or client recognizable proof number, or on the grounds that you've generally gotten it done. On the off chance that your organization fosters a versatile application, ensure the application gets to just the information and usefulness that it needs. Furthermore, don't gather and hold individual data except if it's necessary to your item or administration. Keep in mind, that on the off chance that you gather and hold information, you should safeguard it..

Page 6 (3m 5s)

[Audio] LOCK IT What's the best way to protect the sensitive personally identifying information you need to keep? It depends on the kind of information and how it's stored. The most effective data security plans deal with four key elements: 1.physical security, 2.electronic security, 3. employee training, and 4.the security practices of contractors and service providers..

Page 7 (3m 36s)

[Audio] PITCH IT What resembles a sack of garbage to you can be a mother lode for a personality criminal. Leaving Mastercard receipts or papers or CDs with expressly distinguishing data in a dumpster works with misrepresentation and opens shoppers to the gamble of wholesale fraud. By appropriately discarding touchy data, you guarantee that it can't be perused or reproduced. Execute data removal rehearses that are sensible and suitable to forestall unapproved admittance to or utilization of specifically recognizing data. Sensible measures for your activity depend on the awareness of the data, the expenses and advantages of various removal techniques, and changes in innovation. Really discard paper records by destroying, copying, or pummeling them prior to disposing of. Make shredders accessible all through the work environment, including close to the printer. Ensure representatives who telecommute follow similar methods for discarding delicate records and old PCs and versatile stockpiling gadgets..

Page 8 (4m 46s)

[Audio] PLAN AHEAD Doing whatever it may take to safeguard information in your control can go far toward forestalling a security break. By the by, breaks can occur. This is the way you can lessen the effect on your business, your representatives, and your clients: Has an arrangement been set up to answer security occurrences? Assign a senior individual from your staff to organize and carry out the reaction plan. On the off chance that a PC is compromised, separate itquickly from your organization. Explore security occurrences right away and do whatever it takes to deter existing weaknesses or dangers to individualdata. Consider whom to tell in case of an occurrence, both inside and outside your association. You might have to advise purchasers, policing, credit departments, and different organizations that the break might impact. What's more, many states and government bank administrative offices have regulations or rules tending to information breaks. Counsel your lawyer..

Page 9 (5m 57s)

[Audio] Bank of New hampshire BANKING WITH TRUST.

Page 10 (6m 4s)

[Audio] ANY QUESTIONS. ANY QUESTIONS.

Page 11 (6m 10s)

[Audio] THANK YOU Can reach the target in a short time CEO Sri Harsha Mukkapati.

Page 12 (6m 21s)

[Audio] PRESENTED BY SRI HARSHA MUKKAPATI. PRESENTED BY SRI HARSHA MUKKAPATI.