At School & On-Line: Helping Students Avoid Security Threats on the Internet
|
|
- Adrian Blankenship
- 8 years ago
- Views:
Transcription
1 At School & On-Line: Helping Stuents Avoi Security Threats on the Internet Insert picture in this frame Insert picture in this frame Presentation by Richar K. Avery, CPP Presient, New Englan Region Securitas Security Services USA
2 ri ri Agena Scope of the Problem (Slie 3-6) Potential Impact on University (Slie 7) Proactive Steps to Enhance Data Security (Slie 8-9) Social Engineering: Exploiting Human Psychology (Slie 10) Social Networking Tips (Slie 11-12) Phishing, Pharming an Scams (Slie 13-14) The Low-tech Approach of Laptop Theft (Slie 15-16) Ientity Theft: How oo Names o Ba (Slie 17) Data Breach Institutional Response Checklist (Slie 18) Data Breach Institutional Response (Slie 19) Security Awareness (Slie 20) Q&A Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
3 ri ri Scope of the Problem: Colleges an Universities For example- A very partial list of affecte institutions inclues: Valosta State University in Valosta, eorgia Buena Vista University in Storm Lake, Iowa University of California - San Francisco (UCSF) Meical Center University of Texas Arlington University of North Carolina at reensboro, an The University of North Floria in Jacksonville Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
4 ri ri Scope of the Problem: Corporations 78% of responent organizations experience computer virus attacks over the previous 12 months. 53% experience unauthorize use of their computer systems. The 2009 stuy conucte by the Javelin Strategy & Research Center reveals that: Ientity theft is on the rise, affecting almost 10 million victims in 2008 (a 22% increase from 2007) 71% of frau happens within a week of stealing a victim s personal ata. Low-tech methos for stealing personal information are still the most popular for ientity thieves. Stolen wallets an physical ocuments accounte for 43% of all ientity theft, while online methos accounte for only 11%. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
5 ri ri Scope of the Problem: Stuents an Staff From the Equifax Learning Center: "More than 27 million Americans have been victims of ientity theft in the last five years... To eal with the problem, consumers reporte nearly $5 billion in out-ofpocket expenses." -The New York Times "This year alone more than 500,000 Americans will be robbe of their ientities...with more than $4 billion stolen in their names." -CBSnews.com Any organization or iniviual is vulnerable to cyber attack. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
6 ri ri Scope of the Problem: Universal Concern Victims of Cyber-security Incients are not limite to universities an corporations. Eucational institutions an corporations are far from the only organizations ealing with the aftermath of a cyber intrusion or other ata loss. Defense Department was attacke by malicious hackers a few years ago that force the military agency to take an estimate 1,500 computers offline. Congress ha to give the Homelan Security Department a stern talking ue to over 844 reporte "cyber-security incients" that the agency has experience over the past two years. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
7 ri ri Potential Impact on University In 2007, the U.S. Department of Energy has propose levying a fine of $3 million on the University of California, Oaklan, an a separate $300,000 fine on Los Alamos National Security (LANS), for their allege failures to protect classifie information in an October 2006 security breach. In a formal Preliminary Notice of Violation the DOE liste five separate areas where the school faile to follow DOE requirements for protecting classifie information. Those violations inclue: a failure by the university to protect ata ports, espite knowing about the vulnerability. a failure to impose aequate escorting requirements to etect unauthorize access an removal of classifie ata. the unauthorize reprouction of classifie material both on paper an on removable electronic meia, an allowing the material to be store in a private resience. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
8 ri ri Proactive Steps to Enhance Data Security Steps that can be taken to enhance ata security at a number of eucational institutions: Assess an inventory ata within centrally manage aministrative systems. Implement improvements to ata management protocols. Removal of uplicate information from the schools central atabase. Protect ata that is in use or in storage by reucing access to, an use of, sensitive information except for purposes authorize an essential to institutional work. Conuct esk-by-esk auits of key epartments to ensure aherence to new security stanars. Develop a ata security training program for employees. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
9 ri ri Proactive Steps to Enhance Data Security Aitional Steps Inclue: Ask that employees reouble their efforts to ensure the security an safe practices surrouning their iniviual, epartmental an unit-wie computer systems. Contact people an warn those affecte to look out for ientity theft an to avise them how to protect personal information an provie instructions on how to monitor their creit reports an other financial recors for suspicious activity. Conuct a full investigation of the thefts in collaboration with the university police, local police epartment, an/or the FBI, as well as the University s computing an auit professionals. Hire an outsie agency or company to auit security proceures. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
10 ri ri Social Engineering - Exploiting Human Psychology Social engineering - relies on one of the best aspects of human personality trust. In recent years, social engineering has evolve to encompass a wie range of exploits, usually aime at liberating sensitive, confiential, or proprietary information from unsuspecting stuents an employees. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
11 ri ri Social Networking Tips Social networking sites as pathways leaing to ientity theft. To avoi problems, stuents an other users shoul be avise accoringly: The internet is a public resource. Iniviual users shoul only post information that they are comfortable with anyone seeing. Limit the amount of personal information poste. Be wary of strangers. Be skeptical. Check privacy policies. Stuent an others entering the labor market shoul be very careful what they post. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
12 ri ri Social Networking Tips The grave threat pose by ientity thieves: They can create a whole new you. How stuents can protect themselves: Use anti-virus software. Install a firewall. Stay current with software upates an security patches. Aitionally: Look out for attachments. Log off when you are one for the ay. Pay attention to passwors. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
13 ri ri Phishing, Pharming & Scams "Phishing - elicits secure information through an message that appears to come from a legitimate source such as a financial institution or the University. The message may ask the user to reply with the sensitive ata, or to access a website to upate information such as a bank account number. These fake websites look realistic enough to fool many victims into revealing ata that can be use for ientity theft. "Pharming - also takes avantage of false websites, but reirects users to the false site as they attempt to access a legitimate website. Any secure information entere into the false website, such as a user name an passwor, is capture by hackers. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
14 ri ri Phishing in Acaemia Phishing attacks targete at a specific subset of people, while fairly common in the corporate worl an against banking customers, have not often been use against stuents. In 2008, stuents an faculty at nearly a ozen universities an colleges incluing Columbia University, Duke University, Princeton University, Purue University, an the University of Notre Dame - ha been targete by phishing s. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
15 ri ri The Low-tech Approach of Laptop Theft etting physical / Lock it or lose it: Tell stuents to physically protect their laptop PC against theft in orer to thwart subsequent theft of their finances or ientity. Help plug a huge source of ata leaks! Provie an/or inform stuents an others about available counter-theft tools an evices: Cable an locks Tie-own brackets Anti-theft tags Encryption software Use lockable cabinets in orm rooms an keep orm room oors locke when unoccupie. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
16 ri ri The Low-tech Approach of Laptop Theft Protecting that laptop PC when on-the-go: Keep it out of sight when not being use. Use an inconspicuous carrying case. Keep that laptop close by. Be aware of istractions. There are growing opportunities for thieves on the prowl. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
17 ri ri Ientity Theft: How oo Names o Ba The fastest growing white-collar crime in America is ientity theft: There were 7 million reporte victims in Victims spen an average of 600 hours an $1,400 in out-of-pocket expenses recovering from this crime. The average arrest rate for ientity theft is uner 5% of all cases reporte by victims. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
18 ri ri Data Breach Institutional Response Checklist Have a written post-breach response plan reay an teste before a breach happens. Ensure that institutional officials know what role they will have when a breach happens. Have a communications plan regaring breaches. Know what regulations, statutes, an contracts cover post-breach obligations. Act promptly to prevent further exposure of ata when a breach happens. Promptly fin out what happene an preserve the evience. Involve technology an legal experts as neee. Have raft notices that are reay to be customize with reference to the facts. Contact law enforcement, creit reporting agencies, an the institution's insurance carrier as appropriate. Keep regulators informe, both when require by law an when merely sensible. Provie timely notice; legal ealines are strict. Help affecte iniviuals; their goowill can forestall legal ifficulties. Upate the breach response plan perioically. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
19 ri ri Data Breach Institutional Response Universities shoul promptly take the following actions if a breach has occurre: Contain the breach Convene a response team Analyze the breach Determine timing requirements Collect information promptly Analyze legal implications of the breach Contact law enforcement Contact insurance carrier Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
20 ri ri Security Awareness In general, computer users will always be a weak link, an, consequently, cyber attacks will continue to be successful. Simply being aware of scammers an savvy of their wiles an ways will help protect against them an the amage they can o. The best efense against these kins of attacks is a continuing security awareness program, formalize to the extent that is practicably feasible at each institution. Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
21 ri ri Aitional Information Stuents an others can learn more by visiting the Feeral Trae Commission s Web site at an Securitas Presentation to the New Englan Boar of Higher Eucation ri ri
22 ri ri Integrity Vigilance Helpfulness securitasinc.com Securitas Name Surname Presentation Title of to presentation the New Englan Date Boar of Higher EucationName Surname Title of presentation Date 22 ri ri
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationN O T I C E O F E X A M I N A T I O N
THE CITY OF NEW YORK DEPARTMENT OF CITYWIDE ADMINISTRATIVE SERVICES APPLICATIONS CENTER 18 WASHINGTON STREET NEW YORK, NY 10004 N O T I C E O F E X A M I N A T I O N ACTIVITY THERAPIST (HHC) Exam. No.
More informationSafety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING
Revision Preparation: Safety Mgr Authority: Presient Issuing Dept: Safety Page: Page 1 of 11 Purpose is committe to proviing a safe an healthy working environment for all employees. Musculoskeletal isorers
More informationPresentation Objectives
Gerry Cochran, IT Specialist Jennifer Van Tassel, Associate Examiner Office of the State Comptroller Thomas P. DiNapoli State & Local Government Accountability Andrew A. SanFilippo Executive Deputy Comptroller
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationIdentity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
More informationE-MAIL & INTERNET FRAUD
FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud
More informationState of Louisiana Office of Information Technology. Change Management Plan
State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationOnline Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
More informationNon Qualified Annuity Claimant s Statement
Non Qualifie Annuity Claimant s Statement The Lincoln National Life Insurance Company Service Office P.O. Box 7880 Fort Wayne, IN 46801-7880 Phone: 800-454-6265, Ext.*8200 www.lincolnfinancial.com Overnight
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationSage Match Terms and Conditions of Use (Last updated: 9 November 2015)
1. Acknowlegement an Acceptance 1.1. This Agreement is between: (1) you, the person or organisation registere to use or using the Sage accountancy network service known as Sage Match ; an (2) us, as follows:
More informationQualified Annuity Claimant s Statement
Qualifie Annuity Claimant s Statement The Lincoln National Life Insurance Company Service Office P.O. Box 7880 Fort Wayne, IN 46801-7880 Phone: 800-454-6265, Ext.*8200 www.lincolnfinancial.com Overnight
More informationRLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationIntercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
More informationBuilding The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
More informationEssentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library
Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the
More informationAnalyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
More informationBusiness Identity Fraud Prevention Checklist
Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationIDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
More informationBad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
More informationSECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
More informationOIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
More informationAn Introduction on How to Better Protect Your Computer and Sensitive Data
An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots
More informationCybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
More informationIDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT
More informationTMCEC CYBER SECURITY TRAINING
1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What
More informationIIABSC 2015 - Spring Conference
IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber
More informationSection 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
More informationCybersecurity Best Practices
Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%
More informationACC 626: Research Paper. Website Integrity. Jeannie Wu
ACC 626: Research Paper Website Integrity Jeannie Wu July 1, Introuction Most companies toay have a, either because they are engage in e-commerce activities, or because it is an effective tool to provie
More informationDefensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
More informationDeterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.
Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints
More informationIdentity Theft. Providing Your Student with a Safety Net By Sun Ow
Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial
More informationThe Age of Data Breaches:
The Age of Data Breaches: HOW TO AVOID BEING THE NEXT HEADLINE MARCH 24, 2015 2015 Epstein Becker & Green, P.C. All Rights Reserved. ebglaw.com This presentation has been provided for informational purposes
More informationSEC Issues Proposed Guidance to Fund Boards Relating to Best Execution and Soft Dollars
September 2008 / Issue 21 A legal upate from Dechert s Financial Services Group SEC Issues Propose Guiance to Fun Boars Relating to Best Execution an Soft Dollars The Securities an Exchange Commission
More informationWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft Table of Contents Introduction 3 What is Identity Theft? 4 Important Identity Theft Facts 6 Types of Identity Theft 7 Financial Identity Theft 8 Criminal/Impersonation
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationESTABLISHING MARINE ACCCIDENT CLASSIFICATION: A CASE STUDY IN TAIWAN
ESTABLISHING MARINE ACCCIDENT CLASSIFICATION: A CASE STUDY IN TAIWAN Chung-Ping Liu Caniate for octor's egree Department of Shipping an Transportation Management National Taiwan Ocean University 2, Pei-Ning
More informationA Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014
A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives
More informationCybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
More informationPROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
More informationSecurity Basics: A Whitepaper
Security Basics: A Whitepaper Todd Feinman, David Goldman, Ricky Wong and Neil Cooper PricewaterhouseCoopers LLP Resource Protection Services Introduction This paper will provide the reader with an overview
More informationPREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina
PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro Presented By Roy Davenport Shred-it North Carolina Identity Theft in the US: How BIG Is The Problem? FTC Says it is the fastest
More informationONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR
ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different
More informationPaul Nguyen. 2014 CSG Interna0onal
Paul Nguyen 2014 CSG Interna0onal Security is Top- of- Mind Everywhere High- profile breaches: 2K+ breaches expose nearly 1B records in 2013 Increased regulatory pressure State- sponsored hacking around
More informationWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft Table of Contents Introduction 3 What is Identity Theft? 4 Important Identity Theft Facts 6 Types of Identity Theft 7 Financial Identity Theft 8 Criminal/Impersonation
More informationOnline Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
More informationIs your data secure?
You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?
More informationAustin Peay State University
1 Austin Peay State University Identity Theft Operating Standards (APSUITOS) I. PROGRAM ADOPTION Austin Peay State University establishes Identity Theft Operating Standards pursuant to the Federal Trade
More informationMedical Information Breaches: Are Your Records Safe?
Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential
More informationITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
More informationINFORMATION SECURITY PROCEDURES
INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures
More informationCorporate Account Take Over (CATO) Guide
Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationIdentity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationWhite Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
More information10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
More informationTax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity
More informationIdentity Theft Problem and Solutions
Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or
More informationCyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
More informationNon Qualified Annuity Claimant s Statement
Non Qualifie Annuity Claimant s Statement The Lincoln National Life Insurance Company Service Office P.O. Box 7880 Fort Wayne, IN 46801-7880 Phone: 800-454-6265, Ext.*8200 www.lincolnfinancial.com Overnight
More informationRUNESTONE, an International Student Collaboration Project
RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department
More informationPresented By: Corporate Security Information Security Treasury Management
Presented By: Corporate Security Information Security Treasury Management Is Your Business Prepared for a Cyber Incident? It s not a matter of if, it s a matter of when Cyber Attacks are on the Rise; Physical
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationBelmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
More informationFrom Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense
1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach
More information1 Billion Individual records that were hacked in 2014 3.
783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just
More informationIntroduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com
More informationTYPES OF POSSIBLE IDENTITY THEFT
Identity Theft What is Identity Theft? Identity theft occurs when someone uses your personal information such as your name, social security number, and or other identifying information without your permission
More informationWhy Data Security is Critical to Your Brand
Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait
More informationCybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
More informationHow To Protect Yourself From Identity Theft
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationIs the PCI Data Security Standard Enough?
Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard
More informationPAI Secure Program Guide
PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements and utilizing the PAI Secure Program. Letter From the CEO Welcome to PAI Secure. As you
More informationProtect Yourself From Identity Theft
Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and
More informationDATA SECURITY HACKS, HIPAA AND HUMAN RISKS
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare
More informationSENIORS ONLINE SECURITY
SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that
More informationClient Education. Learn About Identity Theft
Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that
More informationAB 1149 Compliance: Data Security Best Practices
AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California
More informationCYBERSECURITY: Is Your Business Ready?
CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring
More informationScams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationData Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
More informationIT Security DO s and DON Ts
For more advice contact: IT Service Centre T: (01332) 59 1234 E: ITServiceCentre@derby.ac.uk Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON
More information1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
More informationImagine discovering at the end of the day that your wallet is missing. Your driver s license, credit cards
EMPLOYMENT LAW Update Data Security Breaches: Are Your Human Resources Policies Equipped to Avoid and/or Repair the Damage? By Daniel Klein, Esq. INTRODUCTION Imagine discovering at the end of the day
More informationQualified Annuity Claimant s Statement
Qualifie Annuity Claimant s Statement Service Office Overnight Aress: P.O. Box 7880 Lincoln Financial Group Fort Wayne, IN 46801-7880 Death Claims - IA Phone: 800-454-6265, Ext.*8200 1300 S Clinton St.
More informationProtect Yourself From Identity Theft
Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and
More informationCSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY
CSI/FBI 00 COMPUTER CRIME AND SECURITY SURVEY Statement of intent This survey was conducted by the Computer Security Institute (CSI) in association with the San Francisco Computer Crime Squad of the Federal
More informationThe Leading Provider of Endpoint Security Solutions
The Leading Provider of Endpoint Security Solutions Innovative Policies to Defend Against Next-Generation Threats Conrad Herrmann CTO and Co-Founder Zone Labs, Inc. Network Security Is an Uphill Battle
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More information