Data Security. So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Data Security. So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc."

Transcription

1 Data Security So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

2 Table of Contents: 1. Introduction 3 2. Cybersecurity: The loopholes in the system 4 3. Danger: Cybercrime in progress 6 4. Complexity doesn t have to be complicated 7 5. Security Essentials 9 Computerbilities, Inc. 2

3 Introduction It s not a matter of if someone will attempt to breach your network, but when an attempt will occur. While technology may be developing at an incredible rate, the development of data security is usually slower, and many times only happens after we experience a disastrous data breach (such as with Target, Michael s and Neiman Marcus), or after we learn about a system bug (such as Heartbleed). But this isn t good enough anymore. Most of the world s financial and personal information is digitized, so any breach in data security is 21 st Century robbery, and any loss of data from mishandling or natural disasters is often catastrophic. We often think that these things will not happen to us. We will not experience a breach as destructive as Target and Neiman Marcus experienced, or be effected by a bug like Heartbleed. We reason that the smaller businesses are not as desirable to cybercriminals, but the fact is if you do not have any security measures in place, then your data may already be compromised. In 2013, Norton 1 reported that globally more than 1 million people were victims to cybercrime daily, which means that there are about 12 victims every second. This usually happens because network security is lax or nonexistent. Do not be like Target, Neiman Marcus and OpenSourceSSL and wait for a data security disaster to occur before you take action to protect your information; by then it will be too late. Learn from the mistakes of these large players and protect your data before a security breach or loss occurs. With this report, we will help you prepare by making you aware of the potential risks and how you can protect your data from them. 1 Computerbilities, Inc. 3

4 Cybersecurity: The loopholes in the system The past two years have seen significant breaches in cybersecurity. In 2013, Target and Neiman Marcus became victims to the largest breach yet, exposing over 110 million 2 customer s financial and personal data. This happened because of vulnerabilities in Target and Neiman Marcus cyber security. This was predicted in 2012 by Darryl Plummer 3, the Managing Vice President and Gartner fellow: He said that through 2016, the financial impact of cybercrime will grow 10% per year, due to the continuing discovery of new vulnerabilities. While Plummer didn t predict these specific events, he was dead right when he predicted that there would be an increase in the cost of cybercrime as we discovered vulnerabilities in our security systems. But what were the vulnerabilities at Target and Neiman Marcus? It is suggested that about two months prior to what would become known as the largest security breach to date, cyber criminals began sending out troves of phishing s. Later, they sifted through the collected information to find promising potential victims. One of these s made it to an HVAC firm connected to Target, where an unsuspecting employee opened the malicious allowing malware to infect the system. The malware eventually allowed the hackers to gain access to the Point-of-Sale devices and made off with the financial information and personal data of millions of unsuspecting shoppers. In July of 2013, Neiman Marcus 4 was similarly breached. Hackers gained access to their systems and continued to steal card information from customers until October 2013, when the breach finally came to light Info/cat /c.cat?icid=topPromo_hmpg_ticker_SecurityInfo_0114 Computerbilities, Inc. 4

5 Although hackers are responsible for these attacks, the attacks were also made possible by vulnerabilities in Target and Neiman Marcus cyber security. One report 5 stated that Target may have inadvertently made it easier for attackers by leaving massive amounts of internal documentation for vendors on its various public-facing Web properties that do not require a login. This means that Target allowed large amounts of sensitive information to remain on their public facing systems for significant amounts of time, without requiring users to log back in. This leaves data vulnerable and easy to access because the data is not encrypted during that time. So what were the vulnerabilities in Target and Neiman Marcus cyber security? It all comes down to negligence to their cyber security system. One of the first steps to having strong cyber security is being educated about the potential dangers to your data and knowing best steps for avoiding those dangers. It s impossible to know if the HVAC firm educated their employees on how to identify questionable s and links, but if you do take the time to educate your employees than you will decrease the risk of having your network compromised the same way Target s was. You have probably heard the saying Time is money, well, in this day and age, so is information. The breach cost Target $17 million 6 in expenses and caused their profits to fall by 46%, but it also cost many of their customers to lose money as well, which isn t good for customer loyalty. This is why it is critical for your business that you plan ahead by having strong data security measures in place. The time and money that you will put into data security will be far less than the time and money you could lose if your data is stolen or lost. Making sure you have excellent network security can seem daunting, because there are so many different levels to keeping your data secure, but it is quantifiably worth it in the end Computerbilities, Inc. 5

6 Danger: Cybercrime in progress Protecting your data against cybercrime is only one aspect to data security. Data can also be exposed or lost due to bugs, negligence, because of a lost or stolen device, or even because of a natural disaster. Data loss is data loss, and the cost is just as steep, no matter if it was stolen by cybercriminals, misplaced or destroyed in a disaster. In the 2013 Cost of Data Breach study, it was reported that negligence and system glitches together accounted for 64 percent of data breaches last year. These can include employees mishandling information, violation of industry and government regulations, inadvertent data dumps, stolen laptops, and wrongful access. Heartbleed, a bug found in OpenSourceSSL in March 2014, is one such system glitch. OpenSourceSSL is a free cryptographic software library. The code in OpenSource is the foundation for about 2/3 of all websites. In 2012, the Heartbleed 7 bug, which is a piece of faulty code, was introduced to the system allowing an unwanted third party to access sensitive information (such as certificates, usernames and passwords, s and documents) without you ever knowing that your data security had been compromised. This was not an attack. It was not planned by cyber criminals, it was, simply an accident. However, it was an accident that exposed 2/3 of the web to high risk. Picture this: While a bank is being built a tunnel is mistakenly included in the blueprints and added to the building. This tunnel allows direct and unobserved access to the vault. Anyone who knows where to find the entrance to this tunnel can now waltz right into the vault and take whatever they like, without anyone every knowing. Heartbleed was like that tunnel, and while Heartbleed has been patched, it doesn t mean that this cannot or will not happen again. The best thing you can do is stay informed on the latest breaches and bus. That way, you will be able to act quickly when you need to. 7 Computerbilities, Inc. 6

7 What should we learn from Heartbleed? In their annual 2014 security report, Cisco 8 summed it up nicely: There should be an assumption by all users that nothing in the cyberworld can or should be trusted. You should never assume that an application you are using has all of its glitches and vulnerabilities worked out. But you should assume that something will go wrong eventually. So plan for the future. This way, you will be ready and the likely hood of your data being exposed will be exponentially smaller. Sometimes, it is an accident or disaster that exposes your data. It was reported by Aon Benfield 9, that the global cost of natural disasters to businesses totaled $192 billion 10 in In the US alone, we have seen an incredible amount of natural disasters in , including earthquakes, tornadoes, and massive snowstorms. Chances are that your business will be affected by a natural disaster at some point, and it is best to be prepared. Accidents that leave your data exposed can happen at any time. Work phones or laptops can be stolen, lost or broken, causing exposure of critical data that could be taken advantage of by cybercriminals or a disruption in business continuity costing you time and money. Complexity doesn t have to be Complicated In the past year, reporters have started to use words like cybergeddon or digital apocalypse to describe what the last two years have been like for data security. Sometimes it feels like it is impossible to guarantee the safety of our sensitive and critical data. How can you possibly protect yourself against cybercriminals, system glitches, negligence and natural disasters all at once? In some sense, it is as simple as this: be prepared. Learn about the various risks to your data, and stay current on security risks and best practices. Some people were exposed longer by Heartbleed because they had no idea it existed. For example, about 900 social insurance numbers were accessed from a Heartbleed breach at a Canadian Revenue agency. The hackers had access to the data for six hours before anyone found the breach, which is why they were able to get so many social insurance numbers Computerbilities, Inc. 7

8 There are also a few relatively simple things that you can do to make sure your data is secure. First, always use a complex password 11. This means that your passwords should have a combination of upper and lower case letters, numbers, and symbols. By always using a complex password, you will be increasing the complexity of your password when it is stored and encrypted, making it harder for hackers to break your password and gain access to your information. Passwords are the first line of defense, so you need to make sure your defense is strong. The next line of defense is data encryption. One of the reasons hackers were able to steal so much data from Target was because of the lack of encryption. With most business services, there is a timed log-out setting. This means that if you are inactive in your for a while, the software will automatically log you out. This is a great security measure because it means your data is encrypted again after a set amount of time. Target didn t have this feature on their public facing web properties, so customer data was left exposed, and could easily be stolen by cyber criminals. It s not only important that you have encryption, but it s important that you determine the level of encryption. 256-AES is currently the highest encryption standard. With 256-AES, it would take a supercomputer longer than the age of the universe to crack the encryption (which is longer than 149 trillion years). Eventually, someone will probably find a way to crack 256-AES encryption, but in the meantime, it will take a cybercriminal an annoyingly long time to break the encryption and steal your data, so they would likely move on to someone else. If a cybercriminal does break your password or gain access to your device through a phishing or a watering hole website, then they will use viruses or malware to begin siphoning out your data. The best way to protect your data against computer viruses and malware is to install antivirus software, such as 11 Computerbilities, Inc. 8

9 Vipre 12, McAfee 13, or Symantec 14. And these companies can secure all of your devices, including your mobile devices, making sure that your data is secure no matter which device you are accessing it from. While these steps can help insure that your data remains secure and exactly where it should be, they will not help maintain business continuity should a breach, disaster, or accident occur. If something should happen and you should lose your data for some reason, having backup redundancy or a Business Continuity Plan may be the only thing that keeps your business going. There are several different kinds of backup: image, tape, hard drive and cloud are a few. They each have their strengths and weaknesses, and they will all fail you eventually. That is why backup redundancy is so important. You should always have both on-site and off-site backup, and several different forms of backup. If one backup fails or is destroyed, you will have other options. Security Essentials No matter what business you are in, you have a network that contains data which is vital to the continuity of your business. This is why it is essential that your data stays secure. You will need to have protection in place in the case of a security breach; negligence or accidents; and natural, or man-made disasters. Many aspects of data security are relatively simple, such as using complex passwords, making sure your cloud service uses AES- 256 bit encryption, having redundant backup, and using antivirus software. But data security also requires that you stay up to date with the latest security breaches, bugs, and best practices so that you will know when you need to update your security system. Do not be like Target or Neiman Marcus and wait for the cybergeddon. Act now so you do not have to spend more money later Computerbilities, Inc. 9

10 To help make this easier for you, we have come up with 5 Security Essential: 1. Backup Before you do anything, you need to backup your network. If you lose your data for any reason, having backups will allow you to get your business back up and running. 2. Security Audit If your IT support has not done a security audit on you network in a while, this is a good place to start. A Security Audit will let you know exactly where the holes in your data security are. If you don t have IT support but would like to know how secure your network is, we will come and give you a free security audit just call us at (919) Antivirus Antivirus software will seek out and remove, or sometimes quarantine, potentially harmful programs on your network. If you don t have antivirus software set up on your computer, set it up now, and if you already have antivirus software, make sure it is kept updated. 4. Firewall A firewall will help prevent unwanted third-parties from getting in. Unlike antivirus, firewalls do not actively seek out and remove harmful programs, instead it filters programs before they enter your network and only let those that you allow or are secure in. 5. Spam Filter A spam filter will check all incoming mail for viruses and spam, keeping both out of your inbox. Make sure that your has a spam filter because it will help protect you against attacks, such as phishing scams, and viruses. This list is not exhaustive but it is a good place to start when setting up data security on your computer network. Computerbilities is dedicated to providing accessible, understandable, and, most importantly, preventive IT support. If you have any questions about data security, please do not hesitate to contact us at (919) , or by visiting our website: Computerbilities, Inc. 10

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

Cybersecurity Best Practices

Cybersecurity Best Practices Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%

More information

SENIORS ONLINE SECURITY

SENIORS ONLINE SECURITY SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating

More information

MONTHLY WEBSITE MAINTENANCE PACKAGES

MONTHLY WEBSITE MAINTENANCE PACKAGES MONTHLY WEBSITE MAINTENANCE PACKAGES The security and maintenance of your website is serious business, and what you don t know can certainly hurt you. A hacked or spamvertised site can wreak havoc on search

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Common Data Breach Threats Facing Financial Institutions

Common Data Breach Threats Facing Financial Institutions Last Updated: February 25, 2015 Common Data Breach Threats Facing Financial s Although exact figures are elusive, there is no question that the number of data security breaches both reported and unreported

More information

A Case for Managed Security

A Case for Managed Security A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction

More information

Read this guide and you ll discover:

Read this guide and you ll discover: BUSINESS ADVISOR REPORT Provided as an educational service by: Rick Reynolds, General Manager Read this guide and you ll discover: What remote, offsite, or managed backups are, and why EVERY business should

More information

3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database

3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database 3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS

More information

Presentation Objectives

Presentation Objectives Gerry Cochran, IT Specialist Jennifer Van Tassel, Associate Examiner Office of the State Comptroller Thomas P. DiNapoli State & Local Government Accountability Andrew A. SanFilippo Executive Deputy Comptroller

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

10 Smart Ideas for. Keeping Data Safe. From Hackers

10 Smart Ideas for. Keeping Data Safe. From Hackers 0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000

More information

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats Cybersecurity Policy for Small Firms Why is malware now a

More information

Trust the Innovator to Simplify Cloud Security

Trust the Innovator to Simplify Cloud Security Trust the Innovator to Simplify Cloud Security Contents MailGuard Pty Ltd Page 1 of 7 2 Let s get real for a moment. Your antivirus software isn t stopping fastbreak phishing and other spam attacks like

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510 TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

A6- Sensitive Data Exposure

A6- Sensitive Data Exposure OWASP Vulnerabilities and Attacks Simplifie d: Business Manager Series Part 2 Have you heard of the times when Fantastic Frank from Randomland was furious? Money and critical data was being stolen from

More information

Email and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1

Email and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1 Email and Security U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1 Agenda Introduction Email Security Q&A Introduction Gary Harding email:- U3A@GaryHarding.com Spent more than 40 years working in the

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

National Cybersecurity Awareness Campaign

National Cybersecurity Awareness Campaign National Cybersecurity Awareness Campaign About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

SIZE DOESN T MATTER IN CYBERSECURITY

SIZE DOESN T MATTER IN CYBERSECURITY SIZE DOESN T MATTER IN CYBERSECURITY WE SECURE THE FUTURE SIZE DOESN T MATTER IN CYBERSECURITY WE SECURE THE FUTURE TABLE OF CONTENTS SIZE DOESN T MATTER IN CYBERSPACE 03 SUMMARY 05 TOP REASONS WHY SMBS

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

WHAT IS RANSOMWARE AND WHAT CAN I DO TO HELP PREVENT AN ATTACK?

WHAT IS RANSOMWARE AND WHAT CAN I DO TO HELP PREVENT AN ATTACK? WHAT IS RANSOMWARE AND WHAT CAN I DO TO HELP PREVENT AN ATTACK? CONTENTS WHAT IS RANSOMWARE?... 3 HOW DOES RANSOMWARE ENTER YOUR COMPUTER?... 4 WHAT IS A ZERO DAY ATTACK?... 4 HOW DO ZERO DAY ATTACKS WORK?...

More information

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions: A A GENERAL ENGLISH Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + 1 Internet crime Match the following words to their correct definitions: 1. hacker a. a computer program which can make copies of itself

More information

Are You A Sitting Duck?

Are You A Sitting Duck? The 7 Most Cricitcal I.T. Security Protections Every Business Must Have in Place Now to Protect Themselves from Cybercrime, Data Breaches, and Hacker Attacks Cybercrime is at an all-time high, and hackers

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

Know the Risks. Protect Yourself. Protect Your Business.

Know the Risks. Protect Yourself. Protect Your Business. Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet

More information

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to

More information

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers

More information

5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES

5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES White paper 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES PROTECTING PHI ON PORTABLE DEVICES 2016 SecurityMetrics 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES 1 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES PROTECTING

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc.

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc. Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information

More information

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against

More information

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one

More information

Disaster Recovery Planning Save Your Business

Disaster Recovery Planning Save Your Business Disaster Recovery Planning Save Your Business Your business at risk! Your company is at risk for failure in the event of disaster Your data is at risk for costly loss Your revenue is at risk with lack

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Top Five Ways to Protect Your Network. A MainNerve Whitepaper A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

CKAHU Symposium Cyber-Security

CKAHU Symposium Cyber-Security CKAHU Symposium Cyber-Security Scott Logan Technical Director of Security Position: Technical Director of Security Employment: NetGain Technologies (6+ years) NetGain is a Regional partner with 7 locations

More information

7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters

7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters 7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters If You Depend On Your Computer Network To Run Your Business,

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Almost 400 million people 1 fall victim to cybercrime every year.

Almost 400 million people 1 fall victim to cybercrime every year. 400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Impact of Data Breaches

Impact of Data Breaches Research Note Impact of Data Breaches By: Divya Yadav Copyright 2014, ASA Institute for Risk & Innovation Applicable Sectors: IT, Retail Keywords: Hacking, Cyber security, Data breach, Malware Abstract:

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There

More information

Disaster Preparedness for Information Technology

Disaster Preparedness for Information Technology Disaster Preparedness for Information Technology An overview of 4 main components to a disaster recovery plan. For owners or managers of professional offices. Written by Mark Haake, President of Reliance

More information

DISCLAIMER AND NOTICES

DISCLAIMER AND NOTICES DISCLAIMER AND NOTICES The opinions expressed in this presentation are those of the author and presenter alone. They do not represent the views of any other entity. Nothing in this presentation should

More information

Security guide. small businesses and freelancers. Security guide 1

Security guide. small businesses and freelancers. Security guide 1 Security guide small businesses and freelancers Security guide 1 1. Introduction 3. The most dangerous types of threats 5. Will you let us protect you? 2. Where is the danger and how can we protect ourselves?

More information

Medical Information Breaches: Are Your Records Safe?

Medical Information Breaches: Are Your Records Safe? Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

HOW TO PROTECT YOUR DATA

HOW TO PROTECT YOUR DATA HOW TO PROTECT YOUR DATA INTRODUCTION Every day in the news, we hear about data breaches. Are you concerned your sensitive business, customer and supplier data is not protected? Do you have a secret sauce

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

ICTN 4040. Enterprise Database Security Issues and Solutions

ICTN 4040. Enterprise Database Security Issues and Solutions Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of

More information

Cybersecurity: Safeguarding Your Business in the Digital Age

Cybersecurity: Safeguarding Your Business in the Digital Age Cybersecurity: Safeguarding Your Business in the Digital Age Introduction The digitization of our society has had a powerful impact on the ways in which organizations work and relate to their customers

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American

More information

CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC. October 2014. Sponsored by:

CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC. October 2014. Sponsored by: CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC October 2014 Cyber Exposures of Small and Midsize Businesses A digital pandemic Executive Summary Gone are the days when data breaches,

More information

Stay ahead of insiderthreats with predictive,intelligent security

Stay ahead of insiderthreats with predictive,intelligent security Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent

More information

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY An Inside Job Cyberthreats to your business are usually blamed on outsiders nefarious programmers writing malicious code designed to pilfer your

More information

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour SAMPLE ASSESSMENT MATERIAL Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security Date Morning/Afternoon Time Allowed: 1 hour You must have: The Insert (clean copy case study)

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

GUIDE TO PROTECTING YOUR BUSINESS

GUIDE TO PROTECTING YOUR BUSINESS GUIDE TO PROTECTING YOUR BUSINESS GT44GPBW As a small business owner, fraud is a significant threat to your business. According to a 2012 study by the Association of Certified Fraud Examiners, the smallest

More information

NON-PROFIT ORGANIZATIONS NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT CONTRACTING

NON-PROFIT ORGANIZATIONS NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT CONTRACTING NON-PROFIT ORGANIZATIONS NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT CONTRACTING Lee E. Rice 1 and Syed (Shawon) M. Rahman, Ph.D. 2 1 School of Business and IT, Capella University, Minneapolis, MN,

More information

Is the PCI Data Security Standard Enough?

Is the PCI Data Security Standard Enough? Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard

More information

Data Security for Mortgage Companies: A Focus on Employees. Article by Roshni Patel & Daniel McKenna December 2015

Data Security for Mortgage Companies: A Focus on Employees. Article by Roshni Patel & Daniel McKenna December 2015 Data Security for Mortgage Companies: A Focus on Employees Article by Roshni Patel & Daniel McKenna December 2015 DATA SECURITY FOR MORTGAGE COMPANIES: A Focus on Employees BY ROSHNI PATEL & DANIEL McKENNA

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

Building a Business Case:

Building a Business Case: Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security

More information

KEY STEPS FOLLOWING A DATA BREACH

KEY STEPS FOLLOWING A DATA BREACH KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,

More information

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford

More information

Cyber Security Education & Awareness. Guide for User s

Cyber Security Education & Awareness. Guide for User s Cyber Security Education & Awareness Guide for User s Release Q1 2010 Version 1.1 CONTENTS 1. Introduction 2. Protection against Nasty Code 3. System Security Maintenance 4. Personal Firewalls 5. Wireless

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network?

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? Most businesses know the importance of installing antivirus products on their PCs to securely protect

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information