SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)



Similar documents
DATA BREACH COVERAGE

A Proposal of Employee Benefits. Innovations in IDENTITY THEFT

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Benefits Handbook Date March 1, Identity Theft Protection Benefit Program Marsh & McLennan Companies

Information Protection

Preparedness for Data Breach Events Inside and Outside Your Credit Union

Benefits Handbook Date September 1, Identity Theft Protection Benefit Program Marsh & McLennan Companies

Fraud Prevention Checklist for Small Businesses

Cyber Insurance Presentation

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Data Breach and Senior Living Communities May 29, 2015

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

Identity Theft Security and Compliance: Issues for Business

PRIVACY BREACH MANAGEMENT POLICY

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Aftermath of a Data Breach Study

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

Network Security & Privacy Landscape

Certified Identity Protection Advisor (CIPA) Overview & Curriculum

The High Price of Medical Identity Theft and Fraud

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

Managing Cyber & Privacy Risks

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber-Crime Protection

Bearak Reports Inc dba Identity Force

IDENTITY THEFT SOLUTIONS

Data Security Incident Response Plan. [Insert Organization Name]

CYBER RISK SECURITY, NETWORK & PRIVACY

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Information Security Incident Management Guidelines

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Cybersecurity: Protecting Your Business. March 11, 2015

The Onslaught of Cyber Security Threats and What that Means to You

Cybersecurity Issues for Community Banks

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber Security An Exercise in Predicting the Future

Privacy Liability & Data Breach Management Nikos Georgopoulos 1 st Athens Privacy & Data Breach Management Conference

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

How-To Guide: Cyber Security. Content Provided by

CSR Breach Reporting Service Frequently Asked Questions

The Growing Problem of Data Breaches in America

Standard: Information Security Incident Management

Anatomy of a Hotel Breach

Cyber Liability Insurance:

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

KEY STEPS FOLLOWING A DATA BREACH

FACTA Identity Theft Red Flags Program.

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Guidance on data security breach management

WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES

Information Incident Management Policy

4. Please submit response to the attached questionnaire in accordance to instructions.

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

ACE Advantage PRIVACY & NETWORK SECURITY

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Procedure for Managing a Privacy Breach

Identity Theft Protection Plans

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc.

How To Protect Your Network From Attack From A Network Security Threat

Nine Steps to Smart Security for Small Businesses

Transcription:

SafeBiz Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB) 1

About Us Since 2003 we have helped victims of identity theft recover fully from this devastating crime, and continue to protect millions of Americans from this growing problem. Working with individuals as well as some of Americas largest companies. We offer ID theft protection and restoration services at a very affordable cost. We have a 100% track record of restoring victims back to pre-theft status. In addition to offering the most comprehensive and trusted programs in the industry, our team of experts is always available to provide useful advice and counsel to our members. We have partnered with Merchants Information Solutions, who for the past 20 years have offered Americans the highest quality, best in class Identity Theft solutions available today. 2

The New Target: SMB Small & Medium Sized Business Have Become a Prime Target! More Firms Buying Insurance for Data Breaches Boston Globe, Feb 17, 2014 Majority of Organizations Unable to Effectively Respond to and Resolve a Cyber-Attack Yahoo Finance, Feb 12, 2014 The Number of Known Records Lost or Stolen in 2013 totaled 55.2 million or just over 1 million per week - Privacy Rights Clearing House, Feb 2014 3

Data Breaches Data breaches are the greatest risk factor for identity fraud In 2013, one in three consumers who received notification of a data breach became a victim. Financial data is especially favored by criminals who are now more than ever successfully targeting this information for theft and subsequent misuse. 40 percent of companies that experience a data breach reported that they have not developed a formal response plan even after their data breach event. The average cost of a single small business cyber-attack was $9,000.00 4

What is the Threat to Small Business? While most consumer frauds won't net a criminal more than $5,000, targeting a business can bring in 10 times that or more, so from a criminal's viewpoint, it's far more cost-effective to target a business rather than a consumer." Robert Morgester California Deputy Attorney General 5

SMB Data Breach Consequences Fraudulent use of the business name and financial accounts Fraudulent use of business credentials including BIN Reputational risk and negative public relations Lost or stolen customer and employee information Lost or stolen vendor information Accidental loss or malicious intent Fines, penalties and lawsuits Lost revenue and profits Loss of business 6

Business ID Theft Remediation We actively manage identity theft remediation cases for SMBs Fully Managed Business Identity Theft Remediation Blanket Employee ID Theft Recovery Services for Up To 100 Employees With 3 Generation Family Benefits Information Security Breach Response Planning Services Breach Victim Recovery Service for an Affected Group up to 100,000 Consumers Business Internet Monitoring 7

Companies that are Eligible All non-public entities, such as sole proprietorship, partnership, corporation, or professional association Three Levels of Employee Counts 100 or less 500 or less 1,000 or less 8

SMB Data Breach Risk Factors SMB data breach risk factors include people, processes and technologies: People the insider threat, whether accidental or malicious, can include current and former employees, customers, associates, vendors, and independent contractors. Processes including information technology, enterprise risk management, marketing/sales and human resources need to be aligned, defined, and documented. Technologies that are relied on to conduct and grow your business are also being used to identify vulnerabilities and cyber threats on your business. SMBs do not have the same regulatory protections as consumers 9

SafeBiz for Small Business Customers FEATURE DESCRIPTION BENEFIT to the SMALL BIZ EMPLOYEE BENEFIT for up to 100 Employees SECURITY BREACH SOLUTION BUSINESS FRAUD REMEDIATION BUSINESS ACCOUNT MONITORING Fully Managed Identity Recovery Services for up to 100 owners/officers and employees AND their family members (3 generations) Complete end-to-end response planning and execution, and fully managed identity recovery for up to 100,000 affected consumers Business fraud experts on call to investigate and resolve any type of fraud and identity theft using the business name or other business credentials Daily monitoring of the business s primary account to try to detect compromise or misuse before fraud occurs 10 Employer can use benefit as part of overall employee benefit package to attract and retain employees. Eliminates employee distraction and down-time if victimized Saves time, legal expenses, and can help protect the small business from class action and negative publicity Cuts down on loss of use of funds and funding, lost productivity and can save on legal expenses Detects the compromise of account information on internet black markets and other sources

Business Breach Response BREACH INCIDENTS MAY INCLUDE: Computer Hacking Physical Break-In Employee Theft Data Disposal Mailroom Errors Accidental loss of Non-Public Info. Malicious loss of NPI Many Others SERVICES INCLUDED AT NO COST One stop breach response planning Research of state laws Drafting of custom notification letters Creating FAQs, Website Notices, Call Center Scripts, Press Releases, etc. Fully Managed Identity Recovery for up to 100,000 affected records of the small business DISCOUNTED RESPONSE SERVICES INCLUDE: Mailing and Address Resolution Services Call Center Services Credit Monitoring Services Identity Monitoring Services Internet Black Market Surveillance Services 11

Differentiators Unique Product Features & Differentiators Covered - Unknown ID Theft Events that Occurred Prior to the Effective Date of the Plan Covered - Family Fraud Covered - Acts of Terrorism Covered - Domestic Partners and Self-Employed Persons Covered - Extended 3 Generation Family Plan, Including Grandparents and Children Through the Age of 24 Included Credit Monitoring and Credit Report and Score to Every Victim for Duration of Case and 12 Months Following Included - Online 24x7 Access by Victim to Case Status 12

Recovery Advocate Team Advocate Qualifications FCRA & FACTA Certified CITRMS Certified NXG Certified Licensed Private Investigators 17+ Years Avg. Experience Certified Financial Crimes Investigator On Staff Certified Fraud Examiner On Staff Multi-lingual Capability Quality Management Weekly Case Management Reviews Monthly Team Meetings Continuing Education Program Customer Satisfaction Surveys Call Recording and Screen Capture Abandon Rate of 3% or Less Average Time to Answer of 20 Seconds or Less 13

SafeBiz Overview Fully Managed Identity Theft Recovery Comprehensive identity theft research and recovery services for all employees, owners and officers, with benefits extending to 3 generations of family. Security Breach Risk Mitigation End to end BREACH RESPONSE PLAN that provides professional preparation and management, including drafting response letters, Public Relations support and scripting. Fraud Detection A highly sophisticated monitoring program that warns if important credentials of the organization have been compromised. Fraud Research and Remediation if Committed Against the Organization A high touch, professional BUSINESS FRAUD REMEDIATION ADOCATE on call to address instances where the business name or other identifier such as tax ID number, account number, purchase orders, payroll checks and others are used fraudulently by an unknown party or an employee of the company. 14

Contact Information Majestic Security LLC 888-331-2332 Majesticsecurityidsafe.com/safebiz.htm 15