how ethical hacking is healthy for business
DESCRIPTION
The easiest and most accurate way to discover if a business is protected enough to withstand a hack is to test it through the eyes of an (ethical) hacker. Ethical hackers, or penetration testers, act as computer detectives who manually examine a business environment for exploitable weaknesses. This presentation will discuss the importance of ensuring a business network receives the security check-ups it requires to maintain a healthy security posture.TRANSCRIPT
![Page 1: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/1.jpg)
Ethical Hacking isHealthy for Business
![Page 2: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/2.jpg)
Is your company prepared for a situation
like this?
![Page 3: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/3.jpg)
![Page 4: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/4.jpg)
If you had your website, networks, and servers ethically hacked, you probably wouldn’t
be in this situation.
![Page 5: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/5.jpg)
Let’s talk about hackers
![Page 6: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/6.jpg)
There are 2 types of hackers. Malicious
Ethical
![Page 7: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/7.jpg)
Malicious hackers look to exploit weaknesses in a computer or network to steal company or customer information.
![Page 8: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/8.jpg)
Ethical hackers are hired by a company to find weaknesses in that company’s environment.
Ethical hackers are also called penetration testers.
![Page 9: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/9.jpg)
The point? Find the weaknesses malicious hackers would use to gain access to company data, and help companies fix the problem!
![Page 10: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/10.jpg)
Ethical hackers simulate real scenarios.
For example:– Hackers that want to steal
credit card information– Unethical competitors
looking for company secrets– Disgruntled employees who
want to deface a company website
![Page 11: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/11.jpg)
What kind of tests do they conduct?
• Internal/external testing• Web application testing• Remote access testing• Wireless testing• Social engineering
![Page 12: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/12.jpg)
After testing, penetration testers provide:– Report on all vulnerabilities– Assistance to fix the found
vulnerabilities
![Page 13: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/13.jpg)
Why get apenetration test?
Here are 6 reasons.
![Page 14: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/14.jpg)
It’s required(PCI DSS requirement
11.3)
1
![Page 15: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/15.jpg)
To test your products or website for security failures
Did you know more than 79% of data breach victims possess an easily exploitable weakness? -Verizon
2
![Page 16: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/16.jpg)
To properly allocate security funds
3
![Page 17: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/17.jpg)
To test incident response and security awareness of staff4
![Page 18: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/18.jpg)
So you don’t end up on the front page
5
![Page 19: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/19.jpg)
Because hackers become more sophisticated in the ways they steal
data.
They adapt as fast as technologies improve.
6
![Page 20: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/20.jpg)
Most breaches are preventable.
![Page 21: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/21.jpg)
Why can hackers get in so easily?
• Favoring functionality over security
• Insecure software development
• Incorrect configuration• Lack of staff security
education• Gaps in accountability
![Page 22: How Ethical Hacking is Healthy for Business](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bfcc8b379595e2b8b4e61/html5/thumbnails/22.jpg)
3 Best PracticesImplement secure controls and conduct security awareness training
Implement a strict policy for code development & testing
Get ethically hacked!