1 CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC October 2014
2 Cyber Exposures of Small and Midsize Businesses A digital pandemic Executive Summary Gone are the days when data breaches, privacy violations, and other network security incidents were only a big business problem. Countless organizations of all sizes are now victimized daily, and in many cases with crippling effect. Yet many small and midsize businesses (SMBs), typically defined as firms with fewer than 250 employees, are not aware of the risks, or choose to ignore them. This can be likened to society simply ignoring SMBs from all types of industries and all corners of the country are increasingly vulnerable to data breaches, privacy law violations, or other network security incidents. a pandemic. This Advisen report, sponsored by The Hartford, will examine the cyber threat landscape of SMBs, explain the phenomenon surrounding their cyber-risk complacency, and offer actionable suggestions for effectively managing network security risks. Introduction For most employees, as they go about their daily work routines, network security is far from top of mind. Preparing for a meeting, making an impending deadline, or managing customer issues are more urgent concerns. Basic online security practices may routinely be followed, but in a busy corporate environment mistakes can easily be made like clicking on a seemingly innocuous link in an that allows a malicious file to infect the corporate network. For SMBs, this situation is potentially devastating and could turn a thriving company into a struggling one. SMBs from all types of industries and all corners of the country are increasingly vulnerable to data breaches, privacy law violations, or other network security incidents. These events can result from malicious insiders, lost or stolen laptops, or employee error. More and more frequently, however, an attack originates from outside the company by individuals seeking to steal sensitive information, empty corporate bank accounts, or execute any number of fraudulent cyber schemes. 2 October 2014 Advisen Ltd.
3 What many fail to realize is that cybercriminals are opportunistic and SMBs frequently present the better opportunity. Many SMB owners and managers may find it difficult to believe that they are at risk. It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets, for the most part, only report on the largest incidents, which typically affect the largest companies. Furthermore, common sense suggests that the bigger the business, the more desirable the target due to the volume and scope of its operations. Think of U.S. retailer Home Depot, for example. What many fail to realize is that cybercriminals are opportunistic and SMBs frequently present the better opportunity. Cybersecurity experts have repeatedly sounded the alarm about the vulnerability of smaller businesses. The Target breach, for example, was a result of malware introduced by a much smaller corporate partner that likely had far less sophisticated cyber defenses. 1 But a nationwide survey found that a majority of small business managers are not concerned about cyber threats either external or internal. 2 The Hartford s annual Small Business Success Study, which focused on the truly small businesses defined as companies with fewer than 100 full-time employees and annual revenue of $100,000 or more, paints a similar picture, finding that 27 percent of small business owners do not believe a data breach represents a risk to their business. Furthermore, 31 percent of respondents said there would be no impact to their business if their company experienced a data breach. 3 If cybercrime is a disease, these companies do not appear ready to find a solution. A disconnect clearly exists between the reality of the situation and the cyber threat perception of SMBs. However, with data, privacy, and network security risks at an all-time high, it is only a matter of time before SMBs recognize that the time has come to address this digital pandemic. Hopefully, most won t learn the hard way. A not so positive trend In the past SMBs may have been able to neglect network security with little consequence, but this is not the case today. This is highlighted in Symantec s 2014 Internet Security Threat report which found that SMBs (defined as having fewer than 250 employees) accounted for more than half of all targeted attacks (61 percent) in This was an 11 percentage point increase from the previous year. 4 In another study by the National Cyber Security Alliance, it was reported that 20 percent of small businesses fall victim to cybercrime each year. 5 As previously mentioned, cybercriminals tend to be opportunistic. Verizon defines opportunistic attacks as one where the victim is not specifically chosen as a target but identified and attacked 3 October 2014 Advisen Ltd.
4 Historically speaking, of all the cyber incidents tracked by Advisen, SMBs represent approximately 60 percent of the total cases because it exhibited a weakness the attacker knew how to exploit. According to the 2012 Verizon Data Breach Investigation Report, 85 percent of targets of opportunity are small businesses, which they define as organizations with fewer than 1,000 employees. 6 Advisen data shows similar trends. Comprised of cyber intelligence collected since 2000, Advisen s database highlights where and how cyber-related losses are occurring. Defined as businesses with revenues less than $350 million, cyber-related incidents affecting SMBs have had an upward trajectory since 2004 (exhibit 1). Historically speaking, of all the cyber incidents tracked by Advisen, SMBs represent approximately 60 percent of the total cases (exhibit 2). Exhibit 1: Exhibit 2: 4 October 2014 Advisen Ltd.
5 In most cases larger companies are highervalue targets, but they also tend to have more sophisticated IT security systems. Even more frightening are the potential consequences for SMBs if they fall victim to a cyberattack, the most severe of which include going out business. Yet many SMBs still choose not to make cybersecurity a priority. The question is why? Are they not educated on the threats and consequences? Is it complacency? Or is it a bit of both? The easy target for the opportunistic criminal In most cases larger companies are higher-value targets, but they also tend to have more sophisticated IT security systems. SMBs, on the other hand, frequently have less robust security systems and hackers can still gain tremendous value from exploiting their data. SMBs generally have fewer IT resources and devote less time and money to cybersecurity than their larger counterparts. Some outsource their IT and security to a vendor and simply trust that the vendor s data management practices and network security measures are adequate. They are less likely to keep security software up to date, and are generally less knowledgeable of their overall cyber exposures. Security training is often nonexistent. Even companies that want to make cybersecurity a priority often believe they do not have the resources to develop, maintain, and execute comprehensive cybersecurity policies and procedures. The Ponemon Institute estimates that nearly half of SMBs do not have an adequate security budget. 7 The study evaluated the security profiles of small and mid-size companies with fewer than 100 employees up to 5,000. According the National Cyber Security Alliance, 87 percent of SMBs do not have a formal written Internet security policy for employees while 69 percent do not have even an informal Internet security policy for employees. 8 In addition, employees are often not educated on basic cybersecurity practices such as updating anti-virus software, avoiding phishing scams and compromised websites, creating strong passwords, and not using public wi-fi. These factors make SMBs low-risk targets with potentially significant rewards. It is important to note, however, that a lack of cybersecurity focus does not correlate with being less dependent on technology. According to the National Cyber Security Alliance Small Business Study, 87 percent of small businesses have at least one employee who uses the internet daily. According to the same study, 71 percent say their business is at least somewhat dependent on the Internet for daily operations. 9 5 October 2014 Advisen Ltd.
6 Costs arising from a data breach can include forensic IT expenses, fines, credit monitoring and identity restoration, crisis management activities and attorney fees. Another study conducted by the National Small Business Association found that the vast majority of small businesses maintain an online presence via a website and increasingly use social media as part of their online strategies. The study also found that utilization of new technology platforms such as cloud computing, smart phones, and tablets are on the rise, and companies increasingly allow their employees to telecommute. 10 All of these factors have expanded the attack zone of SMBs and are exposing already vulnerable organizations to a greater degree of risk. What are the stakes and who is most at risk? The potential consequence of a data, privacy, and/or network security breach to a SMB is significant. According to the Ponemon Institute s 2014 Cost of a Data Breach Study, data breaches now cost $3.5 million on average, which is a 15 percent increase over The same study also found that the cost per lost or stolen record is on average $145, a 9 percent increase over the previous year. 11 Yet according to The Hartford s 2014 Small Business Success Study, 31 percent of small business owners think there would be no impact to their business whatsoever if it experienced a data breach. 12 But in reality, for many SMBs, sustaining a loss at these levels would severely cripple them, or even put them out of business. Costs arising from a data breach can include forensic IT expenses, fines, credit monitoring and identity restoration, crisis management activities and attorney fees. One significant cost is notifying affected people of the breach. Presently 47 states, the District of Columbia, Guam, Puerto Rico and Virgin Islands have enacted data breach notification laws. The logistics around notifying victims alone can be costly. According to the Ponemon Institute, U.S. organizations on average spend $565,020 on breach notification. 13 The cost and complexity of notification increases with the number of states in which a SMB does business since they are subject to the laws of each state where customers are located. Complying with the regulatory requirements of various states requires a tremendous amount of coordination, time, and resources, which many SMBs simply do not have. The threat of a lawsuit by customers or other affected parties is also a risk. Although victims typically must prove they have sustained demonstrable losses in order to prevail in a suit, in a few significant cases judges have denied motions to dismiss if there was a possibility of future damages. In February 2014, a data breach class action with no claim of financial harm was settled, suggesting some companies may be more vulnerable to lawsuits than was 6 October 2014 Advisen Ltd.
7 While the most targeted attacks in 2013 were against Governments and the Services industry, the industries at most risk of attack were Mining, Governments and Manufacturing. previously believed. 14 Firms that collect valuable information such as payment card or healthcare information are not the only ones at risk. The intentions of cybercriminals vary. Some may seek trade secrets or other intellectual property, others may want access to a larger and potentially more profitable corporate partner, and yet others may want to use a compromised SMB s computers as part of a platform to launch other attacks. It was reported that on average 30,000 new websites per day the majority of which belong to legitimate SMBs are infected and unknowingly distribute malicious code for cybercriminals. 15 Inadvertent transmissions such as these reinforce the importance of network security and the risk of third party liability if an organization s negligence in network security leads to malicious code being transmitted to someone else. Again, no business is immune from the threat of an attack. Nonetheless, certain industries are at greater risk than others. For instance, looking at businesses of all sizes, Symantec found that, While the most targeted attacks in 2013 were against Governments and the Services industry, the industries at most risk of attack were Mining, Governments and Manufacturing. Their odds of being attacked were 1 in 2.7, 1 in 3.1 and 1 in 3.2 respectively. 16 According to Advisen, SMBs in the services sector (e.g. healthcare, education, hospitality etc.) have been the most frequently targeted. This is perhaps not surprising since these companies typically collect and store vast amounts of valuable data. This valuable information not only makes them attractive to outside cybercriminals, but also more prone to insider threats, both accidental and with malicious intent. (Exhibit 3) Exhibit 3: 7 October 2014 Advisen Ltd.
8 Cybercriminals employ a variety of tactics against SMBs ranging from broad based malware attacks to more targeted attacks that utilize ransomware, mobile malware, botnets, DDOS attacks, and brute-force attacks. Tactics and consequences As they attempt to stay a step ahead of network defenses and find paths of least resistance, cybercriminals tactics are constantly evolving. TrendMicro reported that a new threat targets small businesses every second. 17 The ability to execute such attacks has become increasingly simple thanks to underground marketplaces that offer cyber criminals almost every product or service they need to execute an attack. This is referred to as cybercrime as a service (CaaS). Among other things, these marketplaces make it possible to purchase malware, and even hire hackers to execute attacks. Cybercriminals employ a variety of tactics against SMBs ranging from broad based malware attacks to more targeted attacks that utilize ransomware, mobile malware, botnets, DDOS attacks, and brute-force attacks. 18 Broad-based malware attacks are commonly executed via a phishing scheme whereby an employee of the targeted business is tricked into opening an attachment or link within an that covertly installs a malicious file onto the SMB s system. Once installed, cybercriminals can steal sensitive information, empty corporate bank accounts, or potentially gain access to corporate partners. Ransomware is another tactic frequently used against SMBs. When installed on a network the cybercriminal blackmails the user into giving them what they want by either locking them out of their computer, or threatening to go public with secrete or embarrassing information. Of all the cyber-related events affecting SMBs, attacks using these types of tactics are increasing as a percentage of total events. For example, according to Advisen data, Digital Data Breach, Loss, or Theft has been in decline while System/Network Security Violation or Disruption has been on the rise. In fact, 2013 saw the most system/network security violation or disruption events both the absolute number and as a percentage of the total events since Advisen started keeping records in (Exhibit 4) 8 October 2014 Advisen Ltd.
9 Coming to the realization that cyber risks are a serious issue for SMBs is a vital first step in implementing cybersecurity practices. Advisen Defines: Digital Data Breach, Loss or Theft as a Digital breach, distribution, loss, disposal, or theft of personal confidential information, either intentionally or by mistake, in such a way to enable the information to be used or misused by another. System/Network Security Violation or Disruption unauthorized use of or access to a computer or network, or interference with the operation of same, including virus, worm, malware, distributed denial of service (DDOS), etc. Exhibit 4: Risk mitigation Coming to the realization that cyber risks are a serious issue for SMBs is a vital first step in implementing cybersecurity practices. Although a determined hacker can penetrate almost any network, SMBs can avoid or repel the vast majority of attacks with a variety of cybersecurity protocols, many of which require minimal technical resources, time, or money. Here are some suggestions: Keep up with the latest risks: Managers who stay on top of the ways in which cybercriminals are affecting other businesses can make better informed decisions about network security. 9 October 2014 Advisen Ltd.
10 Small and midsize businesses are in the midst of a digital pandemic. Every day across the country more are learning that they have become the victim of a data breach or other cyberrelated incident. Educate staff: Every employee should be aware of how they can help protect the business. Establish basic security practices such as having strong passwords and adhering to internet use guidelines. Hold employees accountable: Establish consequences for employees who fail to follow the established security practices. Utilize basic cybersecurity software and keep it up to date: Cybersecurity software includes antivirus and internet firewall security. Employ mobile device security procedures: Accessing sensitive business information on employees own mobile devices can create significant security challenges. Implement mobile device security procedures such as password protecting the devices, encrypting data, and installing security apps. Use secure wi fi networks: Make sure the business wi-fi is secure, encrypted, and hidden. Discourage employees from using outside unsecured networks. Be prepared to respond to a breach (incident response plan): Without advanced preparation, a serious breach can quickly get out of control. Incident response plans can include what to do to limit the damage, who to contact (lawyers, law enforcement, regulators, affected companies etc.), and understanding what type of information is lost and the associated notification requirements. Purchase Insurance. In addition to providing indemnification for a wide array of privacy and network security losses, many insurers offer access to a variety of pre-breach and post-breach services. Conclusion Small and midsize businesses are in the midst of a digital pandemic. Every day across the country more are learning that they have become the victim of a data breach or other cyberrelated incident. They have joined a group they likely knew existed but never believed they would be a member of. Many chose not to take even rudimentary steps to keep themselves safe and to prepare to respond to an attack. This general lack of cyber threat knowledge and overall complacency put these companies at risk. Some will not survive. 10 October 2014 Advisen Ltd.
11 For those who have yet to become a member of this group, this is a call to action. The pandemic is spreading and the likelihood of being infected grows with every passing day. The good news is that even basic defenses can be effective against an opportunistic attacker, who will simply move on to the next less fortified victim. And if an attack is successful, being prepared can mean the difference between quickly gaining control of the situation with minimal impact and helplessly watching events spiral out of control. There is no excuse for any company to not implement basic cybersecurity measures, and every company should consider insurance protection. n This Report was written by Josh Bradford, Associate Editor, Advisen Ltd. 11 October 2014 Advisen Ltd.
12 1 Symantec 2014 Internet Security Threat Report, Volume 19, response/publications/threatreport.jsp see also statement of Fazio Mechanical Services, faziomechanical.com/target-breach-statement.pdf 2 Symantec and National Cyber Security Alliance, Press Release, New Survey Shows U.S. Small Business Owners Not Concerned about Cybersecurity; Majority Have No Policies or Contingency Plans. 3 The Hartford s 2014 Small Business Success Study, 4 Symantec, Internet Security Threat Report 2014, other_resources/b-istr_main_report_v19_ en-us.pdf 5 National Cyber Security Alliance and Symantec, 2012 National Small Business Study 6 Verizon, 2012 Data Breach Investigations Report, rp_data-breach-investigations-report-2012-ebk_en_xg.pdf 7 Ponemon Institute, The Risk of an Uncertain Security Strategy: Study of Global IT Practitioners in SMB Organizations, (November 2013), 8 National Cyber Security Alliance and Symantec, 2012 National Small Business Study, 9 National Cyber Security Alliance and Symantec, 2012 National Small Business Study, 10 National Small Business Association, 2013 Small Business Technology Survey, wp-content/uploads/2013/09/technology-survey-2013.pdf 11 Ponemon Institute, Press Release, Ponemon Institute Releases 2014 Cost of Data Breach: Global Analysis, (May 5, 2014), 12 The Hartford s 2014 Small Business Success Study, 13 Ponemon Institute, 2013 Cost of Data Breach Study: United States, (May 2013), Sophos, Press Release, Security Threat Report 2012, (January, 24, 2012), en-us/press-office/press-releases/2012/01/security-threat-report-2012.aspx 16 Symantec, Internet Security Threat Report 2014, other_resources/b-istr_main_report_v19_ en-us.pdf 17 TrendMicro, Small Business is Big Business: 5 Things Every Small Business Should Know About Web Threats and CyberCrime, (2012), 18 Dirk A. D. Smith, NetworkWorld, Cybercrooks target SMBs with new types of attacks, (June 24, 2013), 12 October 2014 Advisen Ltd.
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
SIZE DOESN T MATTER IN CYBERSECURITY WE SECURE THE FUTURE SIZE DOESN T MATTER IN CYBERSECURITY WE SECURE THE FUTURE TABLE OF CONTENTS SIZE DOESN T MATTER IN CYBERSPACE 03 SUMMARY 05 TOP REASONS WHY SMBS
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
2013 INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT & October 2013 & INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT: The Third Annual Survey on the Current State of and Trends in Information
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
Security Awareness Campaigns Deliver Major, Ongoing ROI CONTENTS 01 01 02 04 05 06 Introduction The Challenge Immediate Value Evaluating effectiveness Ongoing value Conclusion INTRODUCTION By this point,
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory
Think STRENGTH. Think Chubb. Cyber Insurance Andrew Taylor Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber The World Has Changed Then Now 1992 first text message More txt s that the entire
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES Strengthening Your Community at the Organizational Level Las Vegas, Nevada 2012 Security Awareness and Why is it Important? In today s economic
Understanding Layered Security and Defense in Depth Introduction Cybercriminals are becoming far more sophisticated as technology evolves. Well-publicized security breaches of major corporations are capturing
National Cybersecurity Awareness Campaign About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz email@example.com IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic
Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 firstname.lastname@example.org Presented by: Rob D. Moseley, Jr. 2 West
Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Research Note Impact of Data Breaches By: Divya Yadav Copyright 2014, ASA Institute for Risk & Innovation Applicable Sectors: IT, Retail Keywords: Hacking, Cyber security, Data breach, Malware Abstract:
Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker email@example.com November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute
FOUR ESSENTIAL Cybersecurity Tips for Startups and Small Businesses Cybercrime is a Big Problem for Small Business As you know, there s nothing small about the small business sector. According to the U.S.
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015
SPECIAL REPORT Information Security & Cyber Liability Risk Management The Second Annual Survey of Enterprise-wide Cyber Risk Management Practices in Europe February 2013 SPECIAL REPORT Information Security
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
Gerry Cochran, IT Specialist Jennifer Van Tassel, Associate Examiner Office of the State Comptroller Thomas P. DiNapoli State & Local Government Accountability Andrew A. SanFilippo Executive Deputy Comptroller
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Hot Topics in IT Security PREP#28 May 1, 2014 David Woska, Ph.D. OCIO Security CME Disclosure Statement The North Shore LIJ Health System adheres to the ACCME s new Standards for Commercial Support. Any
THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS David Glockner, Managing Director strozfriedberg.com Overview The big picture: what does cybercrime look like today and how is it evolving? What
IT SECURITY RISKS SURVEY 2014: A BUSINESS APPROACH TO MANAGING DATA SECURITY THREATS Contents Introduction... 2 Key figures... 3 Methodology... 4 Concerns and priorities of IT managers: data comes first...
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
30-SECOND SUMMARY As intelligent, interconnected devices become more widely available and increasingly host high-value information like a hospital patient s medical records the intrusion points for cyber
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title