SlideShare a Scribd company logo
Data Security & Prevention of
Cyber attacks
Introduction
• Data Security and Cyber Attacks
• Importance
• Client’s Confidence
• Huge Liability
• Examples of latest Cyberattacks
• Potential Impact on organisation
Cybersecurity Risks
• Hacking
• Phishing
• Ransomware
• Data Breaches
Current Security Measures
• Firewalls
• AntiVirus Software
• Intrusion Detection
• Protection for Neilsoft
Tier 1
Firewall
Secure Email
Access
Data Transfer
Tier 2
Virtual Private
Network
(Client to Client)
VLAN
(Isolated
networks)
Tier 4
Server / Desktop
Antivirus
Management
Patch
Management
Access
Management
Server O/S Harden
DLP (Data Leakage
Prevention)
Log Monitoring
Tier 5
Restricted
Internet
Access
5 Tiered Strategy for Implementing Security and Confidentiality
Restricted Distribution
© 2022 Neilsoft and/or its affiliates. All rights reserved.
Physical Security
Tier 3
Data In Transit Data at Rest
Tier 1 2 & 3
• This is the layer which is first hit from outside world using internet
• Next Generation Firewall : Palo Alto AI based policy updates
• ML based Engine, Deep learning stops the most evasive threats
• Zero-delay signatures provide updates in seconds
• Stringent Configuration
• Geological Block (Connection open only to few Countries)
• Web Filter for nonproductive and Malicious web sites
• Application whitelisting
• Email System Gateway Protection
• Spam Filter
• Malicious Content Filter
Tier 4 & 5 (Tools Used in Cybersecurity)
• Sentinel One (AntiVirus): XDR Platform encompasses AI-
powered prevention, detection, response, and threat hunting
across user’s desktops
• Log Server : Dimension, Manage Engine
• VPN Login: Cisco Duo , Multifactor Authentication for remote
login
• Firewall : Palo Alto
• Microsoft Windows Server Security Tools: Active Directory,
Microsoft Defender
• Physical Access Control: Restricted Entry to Facility and Data
Center
Internet Flow Protection
Email Flow and its Protection: Inbound
Recommendations from Deloitte
• Recommendations after Recent Audit conducted by Deloitte
• Apply Two factor Authentication for all work from users
• Follow the path for making Neilsoft Forensic Ready
• Keep Logs for at least 180 days for analysing Cybersecurity incidence
Implementation and Ongoing Management
• Process of Ongoing management
• Multifactor authentication “Cisco Duo” is being implemented Target Date : 15
Feb 2023
• Process of forensic readiness is being changed Target Date: 28 Feb 2023
• Implementation of Log Analyser is done , additional devices are being added
Target Date: 15 March 2023

More Related Content

Cybersecurity for Board.pptx

  • 1. Data Security & Prevention of Cyber attacks
  • 2. Introduction • Data Security and Cyber Attacks • Importance • Client’s Confidence • Huge Liability • Examples of latest Cyberattacks • Potential Impact on organisation
  • 3. Cybersecurity Risks • Hacking • Phishing • Ransomware • Data Breaches
  • 4. Current Security Measures • Firewalls • AntiVirus Software • Intrusion Detection • Protection for Neilsoft
  • 5. Tier 1 Firewall Secure Email Access Data Transfer Tier 2 Virtual Private Network (Client to Client) VLAN (Isolated networks) Tier 4 Server / Desktop Antivirus Management Patch Management Access Management Server O/S Harden DLP (Data Leakage Prevention) Log Monitoring Tier 5 Restricted Internet Access 5 Tiered Strategy for Implementing Security and Confidentiality Restricted Distribution © 2022 Neilsoft and/or its affiliates. All rights reserved. Physical Security Tier 3 Data In Transit Data at Rest
  • 6. Tier 1 2 & 3 • This is the layer which is first hit from outside world using internet • Next Generation Firewall : Palo Alto AI based policy updates • ML based Engine, Deep learning stops the most evasive threats • Zero-delay signatures provide updates in seconds • Stringent Configuration • Geological Block (Connection open only to few Countries) • Web Filter for nonproductive and Malicious web sites • Application whitelisting • Email System Gateway Protection • Spam Filter • Malicious Content Filter
  • 7. Tier 4 & 5 (Tools Used in Cybersecurity) • Sentinel One (AntiVirus): XDR Platform encompasses AI- powered prevention, detection, response, and threat hunting across user’s desktops • Log Server : Dimension, Manage Engine • VPN Login: Cisco Duo , Multifactor Authentication for remote login • Firewall : Palo Alto • Microsoft Windows Server Security Tools: Active Directory, Microsoft Defender • Physical Access Control: Restricted Entry to Facility and Data Center
  • 9. Email Flow and its Protection: Inbound
  • 10. Recommendations from Deloitte • Recommendations after Recent Audit conducted by Deloitte • Apply Two factor Authentication for all work from users • Follow the path for making Neilsoft Forensic Ready • Keep Logs for at least 180 days for analysing Cybersecurity incidence
  • 11. Implementation and Ongoing Management • Process of Ongoing management • Multifactor authentication “Cisco Duo” is being implemented Target Date : 15 Feb 2023 • Process of forensic readiness is being changed Target Date: 28 Feb 2023 • Implementation of Log Analyser is done , additional devices are being added Target Date: 15 March 2023