Identity Theft 101 and Beyond. Bryan Stanwood, CPCU, ARM, CIC, AAI Partner, pureprm LLC and The Virtuoso! Experience

Similar documents
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Network Security & Privacy Landscape

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

How to Secure Your Environment

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Identity Protection Guide. The more you know, the better you can protect yourself.

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

How-To Guide: Cyber Security. Content Provided by

Identity Theft Prevention Program Compliance Model

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Online Banking Customer Awareness and Education Program

IT Security Risks & Trends

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Computer Security at Columbia College. Barak Zahavy April 2010

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

2012 Data Breach Investigations Report

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

Remote Deposit Quick Start Guide

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Franchise Data Compromise Trends and Cardholder. December, 2010

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

A practical guide to IT security

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Best Practices Guide to Electronic Banking

How To Protect The Time System From Being Hacked

Austin Peay State University

Presented by Dave Olsen, CPA, President

Cyber Security Awareness. Internet Safety Intro.

V ISA SECURITY ALERT 13 November 2015

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Protecting Yourself from Identity Theft

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

Awareness, Deterrence and

Egress Switch Best Practice Security Guide V4.x

Collateral Effects of Cyberwar

Certified Secure Computer User

Identity Theft Prevention Presented by: Matt Malone Assero Security

Information Security for the Rest of Us

Staying Safe after the Anthem Breach. Dartmouth College 3/25/15 ITS Security Team

Patrick Gray Principal Security Strategist DATA SECURITY CHALLENGES IN THE ALL TOO PUBLIC AND NOT SO PRIVATE SECTORS

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

PROTECTING YOUR IDENTITY:

Contents Security Centre

Network Security & Privacy Landscape

Data Breach and Senior Living Communities May 29, 2015

Boston University Security Awareness. What you need to know to keep information safe and secure

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

SESSION 507 Thursday, March 26, 11:15 AM - 12:15 PM Track: Desktop Support

Best Practices: Reducing the Risks of Corporate Account Takeovers

Reducing Cyber Risk in Your Organization

Information Security Policy

Malware & Botnets. Botnets

SENIORS ONLINE SECURITY

Information Technology Risk Management

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

Addressing the United States CIO Office s Cybersecurity Sprint Directives

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

IN CASE OF EMERGENCY. A guide for managing a data breach quickly and confidently

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

current and previous addresses name/ssn Medical Insurance info UNCLASSIFIED credit info family info phone & fax #

Transforming the Customer Experience When Fraud Attacks

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

Deception scams drive increase in financial fraud

Identity Theft and Online Security

Better secure IT equipment and systems

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

GUIDE TO PROTECTING YOUR BUSINESS

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Impact of Data Breaches

Desktop and Laptop Security Policy

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Identity Theft and Strategies for Crime Prevention

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Intelligent Security Design, Development and Acquisition

Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks. September 16, 2015

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Top 10 Tips to Keep Your Small Business Safe

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Standard: Information Security Incident Management

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cybersecurity: Protecting Your Business. March 11, 2015

Information Technology Security Review April 16, 2012

Transcription:

Identity Theft 101 and Beyond Bryan Stanwood, CPCU, ARM, CIC, AAI Partner, pureprm LLC and The Virtuoso! Experience

Prospecting Things to Discuss Brief Bio The Latest Stats Types of Identity Theft Ways They Get What They Need Mitigation and Prevention Coverage Options What to Do If It Happens to YOU Q & A

Insurance Geek Bio

Sales and Executive Coach Bio Uh, not quite Check out: www.thevirtuosoexperience.com

The Latest Stats Percent of Households and Types Compiled by the Bureau of Justice Statistics, US Department of Justice, 2011, Crime Data Brief

The Latest Stats Key Findings In 2005, 5.5% of population, in 2010, 7.0% Increase from 2005 to 2010 = 1.5%, or 2.5 mil Reduction from 2009 of.5% Credit card is highest and has grown since 2005

The Latest Stats Percentage of Type of Theft Compiled by the Bureau of Justice Statistics, US Department of Justice, 2011, Crime Data Brief

The Latest Stats Ages of Victims Compiled by the Bureau of Justice Statistics, US Department of Justice, 2011, Crime Data Brief

The Latest Stats Key Findings Total victims in 2010 = 8.6 million Heads of Household 12 17 yrs. shows up 65 and older group has less total % 50 64 sees largest relative % increase

The Latest Stats Race of Victims Compiled by the Bureau of Justice Statistics, US Department of Justice, 2011, Crime Data Brief

The Latest Stats Total Financial Loss by Type Compiled by the Bureau of Justice Statistics, US Department of Justice, 2011, Crime Data Brief

The Latest Stats Key Findings Total financial loss of $13.3 billion Credit cards were 54% of victims, but 31.8% of cost Personal Information theft was 9% of total victims, but 29.4% of cost

Victims of Financial Loss The Latest Stats Compiled by the Bureau of Justice Statistics, US Department of Justice, 2011, Crime Data Brief

The Latest Stats Key Findings Spoiler Alert households with income of $75k or more experienced a higher % and it s growing Suburban and Urban dwellers experience victimization at a higher % and it s growing

The Latest Stats Dollar Breakdown of Loss Compiled by the Bureau of Justice Statistics, US Department of Justice, 2011, Crime Data Brief

The Latest Stats Key Findings How much is the mean dollar amount by type? Credit card = $ 970 Other Accounts = $1,080 Personal Info = $5,650

The Latest Stats How About Total Files Exposed? 2011 = 368 Million 2009 = 191 Million *Ponemon Institute 101 Million

Types of Identity Theft Major Types of Identity Theft Financial Credit Cards and Bank Accounts Tax Stealing your tax refund Medical Access to drugs, treatment Criminal Using your name in vain! Driver s License Access to your license Social Security Tax avoidance Synthetic combination of numerous identities Child/Minor Who s checking this?

Attack Targeting Ways They Get It Opportunistic victim presented an ease of attack Targeted company or opportunity was targeted specifically, then a strategy was employed to breach 17% 83% Opportunistic Targeted Verizon 2011 Data Breach Investigations Report

Ways They Get It Malware Defined software or code used to compromise or harm information assets, without owner s informed consent How? 81% of the time, installed remotely by attacker 6% by internet, either automated or initiated 4% email Verizon 2011 Data Breach Investigations Report

Ways They Get It Hacking Defined all attempts to intentionally access or harm information assets without authorization How? Top 5! Exploitation of a backdoor (installed malware) Exploitation of default or guessable credentials Brute force and dictionary attacks Footprinting and fingerprinting Use of stolen login credentials Verizon 2011 Data Breach Investigations Report

Ways They Get It Social Defined deception, intimidation or manipulation to exploit us for access Solicitation/bribery Pretexting Counterfeiting/Forgery Phishing Hoax/Scam How? Top 5! Verizon 2011 Data Breach Investigations Report

Ways They Get It Social Social Approaches 4% 10% 14% 6% 5% 78% In Person Documents Email Web/Internet Phone SMS/Texting Verizon 2011 Data Breach Investigations Report

Ways They Get It Social Company Contacts 5% 3% 1% Regular Employee/End User 8% Finance/Accounting Staff 30% 80% Human Resources Customer Executive/Upper Mgmt 33% HelpDesk Staff System Administrator Verizon 2011 Data Breach Investigations Report

Ways They Get It Misuse Defined using entrusted organizational resources or privileges for any purpose or in a manner contrary to that which was intended How? Top 5! Embezzlement/skimming/fraud Abuse of system access/privileges Use of unapproved hardware or devices Abuse of private knowledge Violation of Web, Internet and Email policies Verizon 2011 Data Breach Investigations Report

Ways They Get It Physical Defined human-driven threats that employ physical actions and/or require physical proximity Tampering (skimmers) Surveillance Theft Snooping Local Access How? Top 5! Verizon 2011 Data Breach Investigations Report

Ways They Get It Asset Types Devices or methods to gain access to the information 1% 1% 1% 22% 76% Servers User Devices Offline Data People Networks Verizon 2011 Data Breach Investigations Report

Ways They Get It Operating Systems 10% 1% 1% 4% 85% Windows Linux Unix Mac OS X Mainframe Verizon 2011 Data Breach Investigations Report

Ways They Get It How Do Companies Figure It Out? 2% 2% 2% 1% 1% 3% 6% 30% 46% 3rd Party Fraud Detection Law Enforcement Customer System Behavior Internal Detection Internal Audit Employee 3rd Party Monitoring Brag or Blackmail Verizon 2011 Data Breach Investigations Report

Mitigation Access Control Corporate Change default credentials User Account checks Restrict and monitor privileged users Network Management Secure remote access services Monitor and filter outbound information Development Security Application testing and code review Verizon 2011 Data Breach Investigations Report

Mitigation Corporate Log Management and Analysis Create logs for all access points and monitor them Define what looks suspicious and monitor THAT Focus dollars on efficiently finding, not instant Training and Awareness Increase awareness of social engineering Train customers/employees the signs of fraud/tampering Incident Management Create an incidence response plan Engage in mock incident testing Verizon 2011 Data Breach Investigations Report

Mitigation Lock the premises Corporate Store personal information and records under lock and key Buy a shredder and use it Take care when sharing info over the phone Install patches and virus software keep up to date Limit access to sensitive information Disconnect ex-employees immediately

Mitigation Personal Use online resources for passwords Carbonite, Last Pass, Mitto, Need My Password Password protection thoughts Kids, pets, cars, etc. not good ideas Instead: Capitalize either all consonants or vowels Use a telephone keypad to switch letters to numbers Use more than one word Use keyboard patterns Choose objects from a picture or painting (vangogh sear) Use words to remember an event (buickv8) Separate words with symbols (buick&v8) Patterned passwords depending on site type

Mitigation Personal LinkedIn and Facebook thoughts Take great care in what you share Don t post when you are out of town! Don t friend anyone you don t know Use the limited options to control personal data Youngsters, Teenagers and the Rest of Us! Candid discussions about what to share Candid discussions about what to open Active involvement in the use of Facebook, Twitter, etc. Computer scans, access points and parental blocks Anti-virus software!

Mitigation Personal Shred everything Secure personal information in the home via a safe or safety deposit box Don t write down passwords, anywhere Be protective of your SSN Be cognizant of people around you when you use PINs and CVNs Don t leave purses, laptops, ipads or any openly viewed items that prompt a theft Don t use any equipment that appears altered

Coverage Options Corporate Purchase cyber crime coverage from your insurance provider Work with a carrier that automatically covers this via an organization like Identity Theft 911 Be certain there is coverage for: Monitoring of affected customers Costs of notification Assistance in securing what broke Risk mitigation and assessment services

Coverage Options Personal Work with a carrier that automatically covers this via an organization like Identity Theft 911 Work with a carrier that has built their own coverage options Talk with your agent about concerns and needs and let them do the work Purchase your own coverage from places like LifeLock

What to do? Corporate Find out what happened Contact authorities as required by law Seek legal advice Compliance with 46 different state laws on notifications Check for insurance coverage Communicate early and often Eliminate the problem Rebuild Revisit your security plan Entrepreneur Magazine, December 2011

What to do? Personal Put a fraud alert with credit reporting agencies and review your credit reports Contact the local police where it happened and complete a police report Close the accounts you know or believe were used File a complaint with the FTC Check with your insurance agent or carrier for coverage

Questions?