Preparedness for Data Breach Events Inside and Outside Your Credit Union
|
|
- Isabel Barton
- 8 years ago
- Views:
Transcription
1 Preparedness for Data Breach Events Inside and Outside Your Credit Union Jim McCabe, Sr. V.P. Identity Theft Services, Vero Mark Pribish, VP & ID Theft Practice Leader, Merchants Information Solutions
2 Senior Vice President, Identity Theft Services Several years of marketing ID theft solutions to auto dealers and financial co s He has established a strong expertise in ID theft and data breach solutions and now regularly blogs & composes ID Theft articles for CUwebsites and on-line publications.
3 Vice President & ID Theft Practice Leader Nationally recognized ID theft risk management expert Interviewed by major national media groups as a subject matter specialist Insights based on 24 years of experience with financial institutions
4
5 SMB s are a Prime Target Cyber-Attacks on the Rise : NSBA 2013 Study Forty-four percent say they have been the victim of a cyber-attack that s high, and really concerning, says Molly Brogan, the director of communications for the NSBA. The average cost of a single cyber-attack came to $8,669.48, which can be a big sum for a small business. Some 36 million Americans received a data breach notification in 2011 (67% increase over 2010) these people were nine times as likely to report fraud. In 2012 there was another 48% Increase over we are facing compound data breach activity (Data Per 2013 Identity Fraud Survey Report from Javelin Strategy & Research) 5
6 Businesses Handle Sensitive Information Social Security Numbers Bank/Credit Card Loan Account Information Drivers License Numbers, Birth Dates, Etc. Businesses Use , Computerized Accounting Systems Procurement Computer And Paper Files To Store Customer and Vendor Identification 2013 Verizon Data Breach Investigations Report All sizes of organizations are getting hacked and different industries affected Financial cybercrime actors typically hit smaller organizations Small businesses of 250 employees or less accounted for 31 percent of attacks 6
7 Types of Data Breaches Unintended Disclosure - sensitive information posted publicly Hacking/Malware - electronic entry via outside party, malware and spyware Payment Card Fraud - fraud with debit and credit cards such as skimming devices at point-of-service terminals Insider - someone with legitimate access intentionally breaches information Physical Loss lost, discarded or stolen non-electronic records Portable Device - lost, discarded or stolen laptop, smartphone or flash drive Stationary Device - lost, discarded or stolen stationary electronic device or server not designed for mobility. Unknown or other 7
8
9 Data Breaches 664,000,000 RECORDS BREACHED from 4,186 Data Breaches made public since 2005 Totaling 13.1 million in 2013!
10 Posted May 5, :38am Updated May 5, :45pm Affinity Gaming reports second data breach Affinity Gaming owns the off-strip Silver Sevens. (Review-Journal File Photo) By HOWARD STUTZ LAS VEGAS REVIEW-JOURNAL Casino operator Affinity Gaming reported a second breach into its system that processes customer credit and debit cards, but the Las Vegas-based company said it currently has no evidence to indicate that information was stolen. Affinity, which operates 11 casinos in four states including the off-strip Silver Sevens and the three Primm resorts, reported the breach on its website April 28. In December, Affinity said the same system had been hacked between March 14 through Oct. 16, resulting in a breach that compromised the credit information for an estimated 280,000 to 300,000 customers. We are confident that the hackers could not remove credit card data beginning in the evening of April 28, We do not have that confidence before April 28. The active investigation will probably continue for another two weeks, said Jim Prendergast, an outside attorney for Affinity. Affinity did not say how many customers might be affected the newest breach. 10
11 Common Identity Theft Crimes Include Bank Debit/Credit/Check/Loan Fraud IRS/Tax and Government Benefits Fraud Phone/Utilities Fraud Employment Fraud Cyber and Terrorism ID Theft Driver License/Passport Fraud Immigration Fraud Criminal ID Theft Fraud Child ID Theft Rental/Lease Contract Fraud 2014 Javelin Strategy & Research Report 13.1 million ID Theft victims in 2013, second highest total ever and ½ million more than 2012 This increase was driven by new account fraud which jumped 50 percent This news comes amid a cascade of hacker and data breach events 11
12 Financial Fraud Loan Fraud 2% Credit Card Fraud 13% Bank Fraud 6% TOTAL FINANCIAL FRAUD = 21% 21 % Non-Financial Fraud Phone and Utilities Fraud 10% Gov t Docs and Benefits Fraud 46% 79 % Employment-Related Fraud 5% Other Fraud 18% (Medical, Internet, Insurance, etc.) TOTAL NON-FINANCIAL FRAUD = 79% 12
13 64% of Americans fear IDENTITY THEFT More than serious health problems; more than personal safety concerns; and more than the risk of natural disasters! (2013 Travelers Insurance Consumer Risk Study) 75% of American voters are worried about their personal information being stolen by hackers, according to the Computer & Communications Industry Association (CCIA) study. Data Breaches, like the one just announced by Target Stores affecting 110+ million people, shows no sign of slowing in the upcoming year with healthcare, energy, financial services, retail and telecom industries continuing to be top targets. (per Experian 2014 Data Breach Forecast, December 2013) Tax Refund Fraud is up dramatically considered at epidemic level (per Tax Inspector General for Tax Administration Report) 13
14 Sr. Vice President, Identity Theft Services
15 It is No Longer a Matter of IF But WHEN You ll Need This Recovery & Restoration Services
16 The Outside Breach Credit Union Members At Risk Target / Neiman Marcus/ Michaels More to Come IRS Tax Fraud Epidemic Hospital Breaches: The Double Threat Member Fears & Anxieties: Financial Loss Personal Time Loss Defamation Wrongful Harassment Job Effects Family Effects 16
17 Monitoring What Does It Really Do? Credit Monitoring: Most Banks & Creditors Charge You Fees to Save Their Own Funds Monitoring Services: credit monitoring is like a smoke detector. All it will do is let you know you have a problem the downside is that credit is just part of your identity Total Financial ID theft represents less than 26% of all ID Theft Regardless of the Amount of Monitoring... There Can Be No Guarantees For The Prevention of ID Theft Millions of Advertising Dollars are Spent to Make Everyone Believe that Monitoring Prevents ID Theft. Creating A False Sense of Security \
18 What Members Really Need Is A Fail Safe Solution! ID Theft FMR Online case status portal for victim and Financial Institution If fraud is suspected, credit monitoring for 12 months Personal Recovery Advocate follow-up for one full year Progress Reports throughout Identity Restoration Creation of law enforcement-grade case file Licensed and Certified Recovery Advocate contacts victim Fully Managed Recovery Process Message to Members: WE VE GOT YOUR BACK! FOR ANY FORM OF ID THEFT OR FRAUD EVENT! Document Replacement of destroyed or stolen documents Identity Theft Threat Assessment and Recovery Plan Secure delivery (overnight or online) of fraud recovery kit 3 bureau credit reports reviewed in initial case assessment Assistance with fraud alert placement, if applicable Database searches to uncover other identity theft issues 18
19 Only The Best ID Theft Recovery Services Offer Members Fully Managed Recovery: We ve Got Your Back and More Extended 3 Generation Family Coverage Member Spouse/Partner Children Parents of the Member Allow Unknown Identity Theft Events that Occurred Prior to the Effective Date of the Plan No Proof Needed to Seek Support; All Forms of ID Theft Family Fraud Unlimited Commitment to Resolution Online 24x7x365 Access to Victim Case Status Don t Settle for Anything Less! 19
20 The Inside Breach Credit Union Risks Grow with Data Mobility Hacker Attacks: Cyber Policy Isn t Enough Malicious or Accidental: Loss of Laptop Internal threats: Employees/Customers/Servicer Institution Fears & Anxieties: Financial Loss Reputational Risk Lost Member Confidence Compliance Efforts & Cost Potential Fines, Penalties, & Lawsuits: FTC, SEC, State 20
21 Target CEO Gregg Steinhafel resigns following last year's security breach By The Associated Press May 5, :25 am NEW YORK (AP) - Target's massive data breach has now cost the company's CEO his job. Target announced Monday that Chairman, President and CEO Gregg Steinhafel is out nearly five months after the retailer disclosed the breach, which has hurt its reputation among customers and hammered its business. Experts say his departure marks the first CEO of a major corporation to resign in the wake of a data breach and underscores how CEOS are now becoming more at risk in an era when such breaches have become common. Read more: NXG Strategies LLC 21
22 Policies, Procedures, Training & Full Compliance What Does It All Guarantee? Regardless of the Amount of Best Practices in Place... There Can Be No Guarantees For The Prevention of a Data Breach Event! In These Times it is more like of WHEN, Not IF it happens!
23 Prevention & Detection: Enhance your preventive policies & procedures Enterprise Monitoring Service Continuous business monitoring of black market sites known to traffic stolen identities Suspicious activity alerts to the credit union, via and SMS text message Employee & Staff ID Theft Protection Services Fully Managed Identity Fraud Research, Remediation, and Recovery For Employee & Family Allows employees to focus on the job while the Recovery service focuses on the resolution of the identity fraud event 23
24 Mitigation & Restoration: Develop a Customized, Strong Response Program for WHEN it happens 48 Hour Breach Response Plan Follow State and Federal Compliance Notification Guidance Develop Customized Member Notification Letters Develop Employee Talking Points and FAQs Develop Call Center Scripting Develop Website Banner Messaging and Other PR needs to minimize the negative impact when new of breach is released 24
25 Crafting a Non-Interest Income Strategy Ben Rogers Research Director, Filene Research Institute Statistics show that non-interest income is essential to the continued health & sustainable growth of credit unions for the future Credit Unions must be find responsibly creative ways to generate noninterest income Member Friendly alternatives that add to the value proposition of your institution fosters the best non-interest income success Keys to Success: Transparent fees, assessed to those members who create risk, at the least expense and some kind of choice is provided Top Two (from list of15) creative ways that CU s can attract non interest income 1. Find ways to package checking accounts with upgrades 2. Identity protection offerings The Filene Research Institute is an American credit union and consumer-finance think tank headquartered in Madison, Wisconsin. 25
26 Consumer Lifestyle Financial Services Study Dr. Dan Geller, Executive Vice President, Market Rates Insight Scope of Study: Measuring bank customers and credit union members desire for lifestyle financial services Consumer lifestyle changes are redefining the role of Financial Institutions Lifestyle Financial Services will be key to success focusing on technology and the personal lifestyle needs of a new generation Major Difference: Consumers are willing to pay fee s for these lifestyle financial services while they see traditional services as entitled and should be free for doing business Two Reasons Why FI s should adapt to this transformation in new services 1. Sharp decline in service fees on traditional services 2. Growing importance of these new services in the lives of consumers Results of Research : Top Two Desired Lifestyle Services (out of 7): #1 Choice 82% of Respondents want ID Theft Alerts and will pay $3+/mo. #2 Choice 73% of Respondents want Credit Scores and will pay $3.5+/mo. Market Rates Insight was founded in 1985 as the first research service offering competitive financial market rate data online 26
27 ID Theft Solutions IDProSelect Blanket Coverage for Credit Union Employee Coverage CU Member & Family Coverage Institution Data Breach Protection Website Options to Offer Upgrades including Monitoring Includes Non-Interest Income VBiz Small Business Solution Data Breach Protection & Recovery Blanket Employee Coverage Client Coverage Option Includes Non-Interest Income THE Ultimate Safety Net When Breaches Occur! Call to Schedule Your Webex for Details 27
28 Questions & Answers 28
29 For questions or more information, please contact: Jim McCabe Sr. V.P., Identity Theft Services Vero THANK YOU! Mark Pribish Vice President & ID Theft Practice Leader Merchants Information Solutions
The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016
The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,
More informationSafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)
SafeBiz Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB) 1 About Us Since 2003 we have helped victims of identity theft recover fully from this devastating crime, and continue
More informationBeazley Group Beazley Breach Response. A data breach isn t always a disaster Mishandling it is.
Beazley Group Beazley Breach Response A data breach isn t always a disaster Mishandling it is. A world of risk 932.7m Personal records breached in the U.S. since 2005 3 51% The proportion of breaches attributable
More informationPrivacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
More informationSMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015
SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory
More informationIDENTITY THEFT AFFIDAVIT INSTRUCTIONS
IDENTITY THEFT AFFIDAVIT INSTRUCTIONS To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you did not create the debt to each of
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationDATA BREACH POLICY IMPLENTATION GUIDE
DATA BREACH POLICY IMPLENTATION GUIDE OCTOBER 15, 2007 1 Data Breach Policy Implementation Guide Purpose The response to any breach of personally identifiable information (PII) can have a critical impact
More informationCybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
More informationIdentity Thieves are Always at Work They Can Strike Anyone, Anytime, Anywhere
Identity Thieves are Always at Work They Can Strike Anyone, Anytime, Anywhere 2014 LifeLock, Inc. All Rights Reserved. LifeLock, the LockMan Icon, LifeLock Ultimate and Relentlessly Protecting Your Identity
More informationTax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?
1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?
More informationData Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
More informationBenefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS
FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive
More informationDATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
More informationIdentity Theft Repair Kit
Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact
More informationThis notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.
RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every
More informationHOME DEPOT DATA BREACH
HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data
More informationDATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem
More informationhttp://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationCybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
More informationHow child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
More informationTHE PROBLEM OF IDENTITY THEFT AND FRAUD
Identity theft and fraud don t just threaten financial assets and tie up resources. They leave victims feeling inconvenienced, unsettled, and even betrayed. What is Identity Theft? Identity theft is when
More informationIdentity Theft Repair Kit
Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More informationLetter from the CEO. January 25, 2014. To Our Valued Michaels Customers:
Letter from the CEO January 25, 2014 To Our Valued Michaels Customers: As you may have read in the news, data security attacks against retailers have become a major topic of concern. We recently learned
More informationHow to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors
How to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors July 2014 Executive Summary Data breaches cost organizations millions and sometimes even billions of dollars in
More informationReclaiming your identity
Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist
More informationMilford Police Department
Identity Theft Packet Information and Instructions This packet is to be completed once you have contacted Milford Police Department and obtained a police report number related to your identity theft case.
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationDeluxe Provent : Protecting against expanded threats. Providing for expanded opportunities.
Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities. i n t r o d u c t i o n Identity thieves are smarter and more organized than ever before, claiming over 8.1 million
More informationFamily Protection Plan
Providing Customizable Products & Services Family Protection Plan The Most Comprehensive Discount Legal Product Available Legal Care Identity Theft Solutions Free & Discounted Legal Care Legal Club of
More informationThe Home Depot Provides Update on Breach Investigation
The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers
More informationA Proposal of Employee Benefits. Innovations in IDENTITY THEFT
A of Employee Benefits Innovations in IDENTITY THEFT Innovations in IDENTITY THEFT Name or Logo 2 Innovations in IDENTITY THEFT A Complete Identity Theft Solution Prevention to Prosecution Solution
More informationFraud Assist Toolbox Benefit Summary Sheet
Fraud Assist Toolbox Summary Sheet The Fraud Assist Toolbox is a convenient, online tool that helps members prevent and resolve problems that arise from identity theft more quickly by using the interactive
More informationMarch 22, 2013. Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206
March 22, 2013 March 22, 2013 Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206 InfoArmor is pleased to present the Tennessee State Employees Association (TSEA) with the following
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More informationPREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina
PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro Presented By Roy Davenport Shred-it North Carolina Identity Theft in the US: How BIG Is The Problem? FTC Says it is the fastest
More informationCyber Liability. What School Districts Need to Know
Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have
More informationIdentity Protection Guide. The more you know, the better you can protect yourself.
Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious
More informationCITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT
CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT 101 4 TH Street Southeast Rochester, Minnesota 55904-3761 507-328-6800 Fax 507-328-6975 To: From: Subject: Identity Theft and Internet Crime Victims Rochester
More informationACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division
More informationID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
More informationWISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
More informationID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N
ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N M i c h e l l e C u m m i n g s, C I A, C F E, C D F M According to the National Crime Victimization
More informationLake County Sheriff s Office Identity Theft/Fraud Packet
Gary S. Borders, Sheriff Lake County Sheriff s Office Identity Theft/Fraud Packet Information and Instructions The Information and Instructions portion of this packet is for you to keep and contains information
More informationStatement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the
Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005
More informationInformation Security Addressing Your Advanced Threats
Information Security Addressing Your Advanced Threats Where We are Going Information Security Landscape The Threats You Face How To Protect Yourself This Will Not Be Boring What Is Information Security?
More informationYork County Sheriff's Office Identity Theft Victim s Packet
York County Sheriff's Office Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have received a copy of your police report from the York County Sheriff's
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationPROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
More informationCyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
More informationLessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd
Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual
More informationIdentity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Chandler Police Department and obtained a police report number related to your identity
More informationIdentity Theft. Emergency Repair Kit
Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair
More informationChild Identity Theft Study
Child Identity Theft Study Conducted by Javelin Strategy & Research October 2008 2008 Javelin Strategy & Research All Rights Reserved Executive Summary Rarely do parents or guardians consider the possibility
More informationWho s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
More informationWhen Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
More informationThe Growing Problem of Data Breaches in America
Continuity Insights The Growing Problem of Data Breaches in America Today s Questions to Cover 1. What is a Data Breach? 2. How Significant is the Problem? 3. How Do Thieves Steal the Data? 4. How Does
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationHow To Protect Your Computer From Attack
FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationIdentity Theft Victim s Packet
Identity Theft Victim s Packet In this packet: Information and Instructions Section 1, # of pages 6 Fair and Accurate Credit Transactions Act of 2003 Section 2, # of pages 3 ID Theft Affidavit Section
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationIdentity Theft/Credit Fraud Kit
Provided by: Your source for information on Credit Reports and Credit Scores, where you can also safely order your own 3 Bureau Credit Report online that includes your credit information from Equifax,
More informationHow To Get A Credit Card From A Fraudulent Account
Information and Instructions This packet is to be completed once you have contacted New York State University Police and obtained a police report number related to your identity theft case. To obtain a
More informationInstructions for Completing the ID Theft Affidavit
Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt
More information1 Billion Individual records that were hacked in 2014 3.
783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just
More informationRemarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
More informationCYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
More informationIDENTITY THEFT VICTIM S PACKET
DEPARTMENT OF PUBLIC SAFETY 1150 Canton Center S Canton, MI 48188-1699 John R. Santomauro, Director of Public Safety IDENTITY THEFT VICTIM S PACKET INFORMATION AND INSTRUCTIONS The purpose of this packet
More informationIdentity Protection Services
Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading
More informationA UNIQUE SERVICE PACKAGE FOR WHITE MOUNTAINS INSURANCE GROUP
A UNIQUE SERVICE PACKAGE FOR WHITE MOUNTAINS INSURANCE GROUP As part of your employee benefit package you are provided with a suite of OneBeacon Services! The suite of services provides help with avoiding
More informationIdentity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Lafayette County Sheriff s Department and obtained a report number related to your
More informationWhy Avoiding LegalShield At Your Company Could Be Expensive For Your Business!
Why Avoiding LegalShield At Your Company Could Be Expensive For Your Business! Don t your employees and their families deserve your help if your business knows about ways to keep them protected from the
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationDATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and
More informationLog on to: www.idprotectme247.com using Access Code AZ271653 to register and access the benefits provided by IDProtect.
Banner Federal Credit Union is pleased to offer identity theft protection, powered by IDProtect Identity theft takes a serious financial and emotional toll on its victims. More than 11.6 million Americans
More informationPENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft
More informationIdentity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Lake Oswego Police Department and obtained a police report number related to your identity
More informationTop Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.
Top Ten Fraud Risks That Impact Your Financial Institution Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC Agenda Education on understanding the fraud risk Take away.. Education to
More informationPlymouth Township Police Department s Identity Theft Victim s Packet
Plymouth Township Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Plymouth Township Police Department and obtained
More informationFirst Steps for Victims of Identity Theft
First Steps for Victims of Identity Theft Colorado Bureau of Investigation Identity Theft/Fraud Investigation Unit Colorado Bureau of Investigation ID Theft/Fraud Unit 710 Kipling Street Suite 200 Denver
More informationEmployee ID Theft Resource Guide
Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone
More informationInformation Protection
Information Protection Security is Priority One InfoArmor solutions are created to be SSAE 16, ISO 27001 and DISA STIG compliant, requiring adherence to rigorous data storage practices. We not only passed
More informationAdministrative Procedures Memorandum A1452
Page 1 of 11 Date of Issue February 2, 2010 Original Date of Issue Subject References February 2, 2010 PRIVACY BREACH PROTOCOL Policy 2197 Management of Personal Information APM 1450 Management of Personal
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationIdentity Theft Packet
BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone
More informationFraud Prevention Checklist for Small Businesses
Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can
More informationFacts and Statistics
Facts and Statistics A Wall Street Journal poll asked Americans what they feared most in the new millennium. Privacy came out on top, substantially higher than terrorism, global warming and overpopulation.
More informationWest Palm Beach Police Department s Identity Theft Victim s Packet
West Palm Beach Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted West Palm Beach Police Department and obtained a
More informationData Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
More informationInvestigation and Prosecution of Identity Theft
Investigation and Prosecution of Identity Theft In an effort to assist you in dealing with problems related to Identity Theft, the Menomonee Falls Police Department has prepared this packet of information
More informationCommon Data Breach Threats Facing Financial Institutions
Last Updated: February 25, 2015 Common Data Breach Threats Facing Financial s Although exact figures are elusive, there is no question that the number of data security breaches both reported and unreported
More informationForensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014
Forensic Accounting and Identity Theft Georgia HFMA Financial Executives Meeting December 12, 2014 The Federal Criminal definition of identity theft is when someone knowingly transfers, possesses, or uses,
More informationImpact of Data Breaches
Research Note Impact of Data Breaches By: Divya Yadav Copyright 2014, ASA Institute for Risk & Innovation Applicable Sectors: IT, Retail Keywords: Hacking, Cyber security, Data breach, Malware Abstract:
More informationHow to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing
More information