Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director

Similar documents
Internet threats: steps to security for your small business

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

How to Practice Safely in an era of Cybercrime and Privacy Fears

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Client Security Risk Assessment Questionnaire

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Stable and Secure Network Infrastructure Benchmarks

Data Security in the Insurance Industry: WHAT YOU NEED TO KNOW

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

IIABSC Spring Conference

HIPAA Security Balancing Security & Costs

Network and Security Controls

How-To Guide: Cyber Security. Content Provided by

F G F O A A N N U A L C O N F E R E N C E

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

OCR LEVEL 3 CAMBRIDGE TECHNICAL

INFORMATION SECURITY FOR YOUR AGENCY

Data Breaches and Cyber Risks

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

How are we keeping Hackers away from our UCD networks and computer systems?

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Current News & Events

Are You A Sitting Duck?

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Cybersecurity Health Check At A Glance

SECURITY CONSIDERATIONS FOR LAW FIRMS

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY

CyberSecurity & Keeping your data safe. October 20, 2015

Understanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Norton Mobile Privacy Notice

AUDIT TAX SYSTEMS ADVISORY

Data Breaches and Cyber Risks

The Risks of Cloud Storage

17 DAYS TO ROCK SOLID CYBER SECURITY

Roger s Cyber Security and Compliance Mini-Guide

The Hidden Dangers of Public WiFi

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

How To Protect Yourself From A Hacker Attack

Network Security Administrator

Know the Risks. Protect Yourself. Protect Your Business.

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

10 Quick Tips to Mobile Security

I ve been breached! Now what?

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

A Technical Template for HIPAA Security Compliance

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

A Case for Managed Security

Information Technology Acceptable Use Policies

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

10 Ways to Better Secure Your Agency Data

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

HIPAA Privacy and Security Risk Assessment and Action Planning

Altius IT Policy Collection Compliance and Standards Matrix

What s New with HIPAA? Policy and Enforcement Update

HIPAA Compliance for Mobile Healthcare. Peter J. Haigh, FHIMSS Verizon

Medical Information Breaches: Are Your Records Safe?

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs

SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY. Symantec 2010 SMB Information Protection Survey. Global Data

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls

9 Simple steps to secure your Wi-Fi Network.

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

Have you ever accessed

EndUser Protection. Peter Skondro. Sophos

Chapter 15: Computer and Network Security

Corporate Account Takeover (CATO) Risk Assessment

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

PROTECTING YOUR IDENTITY:

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Small Business IT Risk Assessment

Dedicated IT Support. BEFORE You Need It. Save Time, Money and Headache.

Information Security Addressing Your Advanced Threats

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

What Data? I m A Trucking Company!

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Unit 3 Cyber security

DATA SECURITY POLICY. Data Security Policy

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Silent Safety: Best Practices for Protecting the Affluent

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

s Software as a Service (SaaS) offering: T-Suite Making your hard costs soft

SERVICES AND PACKAGES

Cyber Security. John Leek Chief Strategist

How To Protect Yourself From Cyber Threats

Cyber Self Assessment

National Cyber Security Month 2015: Daily Security Awareness Tips

Managed IT Solutions. More Reliable Networks Are Our Business

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

Transcription:

Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director in Kenneally and Company s technology consulting practice

Major data breaches in 2014 ebay Michaels Stores Bank of America Home Depot P. F. Chang s

The Outlook for 2015 Retailers will harden their systems with chips Health care breaches will persist Business leaders are being held directly accountable for data breaches Employees and negligence are the leading cause of security incidents More hackers will target cloud data

How do you know?

52 percent of small businesses had NO basic cyber security strategy While 85 percent of those owners said they felt their companies were safe from cyber threats 77 percent had no formal written Internet security policy

Of the 621 confirmed data breach incidents Verizon recorded in 2014, over 30% of these incidents were at entities with fewer than 100 workers. Cyber attacks on small businesses with fewer than 250 employees represented over 30% of all attacks in 2014, up from 18% in the prior year. Of all the attacks the report studied, it found 96 percent were not difficult to achieve and 97 percent were avoidable.

Local CPA and accounting firm Did not have a proper data backup rotation of media Lax anti-virus software Ransomware / CrytoLocker Encrypted ALL of their server and workstation data Word documents Excel spreadsheets PDFs Quickbooks data files

Virus removal and remediation attempt Contact Russian hacker via hacker web browser and email Pay $300 ransom using Bitcoin wallet Received key / Only unencrypted 80% of the firm s files Services and fees close to $2,000 (not including billable down time costs)

Internet and local network security Poor data backup strategies / Disaster recovery Remote access / Employees in the field / Cloud computing Smartphones Disgruntled employees

Don t take it personal on the Internet, you are just a number (IP address) Even a small amount of personal data or credit information can be aggregated and sold for profit Bored and tech-savvy teenagers now have access to hacker tools (We are not just dealing with Dmitri from Ukraine anymore)

Business-class firewall hardware device (IT CAN NOT be a Linksys router from Walmart or your ISP s Internet modem) Business-class anti-virus /anti-malware (Free is NOT better, it s worse!!) Lock down your wireless Internet (Get a guest wireless network that is separate from your office wireless for visitors to use for Internet access) Spam detection and removal software Internet content filtering (Your employees are less likely to get you in trouble if they can t get there to start with) Use complex passwords that are forced to change on a regular schedule (Password1 is not a good password) Educate your employees (Maybe I should not click on the web link in that FBI email. Why is the FBI contacting me via email anyhow? Hmmm!!!)

You should have a local and automatic backup system with a proper rotation of media. (Manually copying files to a flash drive once a month is NOT good enough) Off-site / encrypted backup to a cloud provider Server and crucial workstation imaging software for fast disaster recovery RAID (Fault tolerance of your data drives on servers AND workstations) Test your data backups regularly (You will never realize just how important your data backup is until the day that you need it)

Regular security and Internet browser updates for their computing devices Local firewall software for when browsing the Internet off-site (Again, FREE is not better) No public wireless (Use personal Internet hot-spot) VPN (virtual private network) when accessing company servers and files remotely Eliminate and restrict actual data on the local computers (App servers) Hard drive encryption on notebooks and mobile computing devices

Use local cellular data plan rather than public wi-fi access Password protect & autolock your device Limit your use of document sharing / sync apps (Sugarsync, Box.net) Smartphones should be owned by and used for the company ONLY! Use remote find and/or remote wipe capabilities

Tighten network and computer file security permissions / Restrict access to only the information that they need Computer monitoring software Disable computer accounts and access before you make them an ex-employee Security cameras can help with fraud, theft and productivity Restrict physical building access (security systems with key card or key code access)

When considering web security there are two pieces that matter: The first is anonymity: how to keep people from knowing what sites your employees are visiting. The second is privacy: how to keep people from accessing the information your employees send.

Some basic strategies for safe and private web browsing: 1.Spam email filtering 2. Internet content filtering 3. Use private browsing options for your browser 4. User alternate web browsers 5. VPN (virtual private network) web browsing

Meet professional compliance standards (HIPAA, PCI-DSS, DoD, Federal contracts) Discover previously unknown security threats Avoid damage to business reputation (Don t think New York Times or USA Today Think Baltimore Sun, The Daily Record or the Aegis) IT security breach remediation costs lots of money (Its less costly to be proactive than it is to be reactive)

Professionals hackers are available for hire: https://hackerslist.com/ Disgruntled employees hacking company email accounts Competitors accessing your bids on your servers Thieves accessing your financial accounts

How do you know?