How-To Guide: Cyber Security. Content Provided by



Similar documents
National Cyber Security Month 2015: Daily Security Awareness Tips

Network Security & Privacy Landscape

How To Protect Yourself From Cyber Threats

Privacy and Data Breach Protection Modular application form

Cyber Threats: Exposures and Breach Costs

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

SECURITY CONSIDERATIONS FOR LAW FIRMS

Nine Steps to Smart Security for Small Businesses

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Managing Cyber Risk through Insurance

Computer Security at Columbia College. Barak Zahavy April 2010

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Defensible Strategy To. Cyber Incident Response

ITAR Compliance Best Practices Guide

2012 NCSA / Symantec. National Small Business Study

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Mitigating and managing cyber risk: ten issues to consider

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

10 Smart Ideas for. Keeping Data Safe. From Hackers

Cyber Security An Exercise in Predicting the Future

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Certified Secure Computer User

What Data? I m A Trucking Company!

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Managing Cyber & Privacy Risks

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Business Case. for an. Information Security Awareness Program

Internet threats: steps to security for your small business

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

SecurityMetrics. PCI Starter Kit

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

FERPA: Data & Transport Security Best Practices

PDSA Special Report. Is your Company s Security at Risk

Technology, Privacy and Cyber Protection Modular application form

Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks

Cybersecurity Best Practices

Reducing Cyber Risk in Your Organization

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

CYBER RISK SECURITY, NETWORK & PRIVACY

SecurityMetrics Introduction to PCI Compliance

Impact of Data Breaches

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

AB 1149 Compliance: Data Security Best Practices

Top five strategies for combating modern threats Is anti-virus dead?

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Five Trends to Track in E-Commerce Fraud

INFORMATION SECURITY FOR YOUR AGENCY

I ve been breached! Now what?

The SMB Cyber Security Survival Guide

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

10 Quick Tips to Mobile Security

NATIONAL CYBER SECURITY AWARENESS MONTH

PCI Compliance. Top 10 Questions & Answers

PCI Compliance for Healthcare

Cyber-Crime Protection

Hengtian Information Security White Paper

SMALL BUSINESS PRESENTATION

7 VITAL FACTS ABOUT HEALTHCARE BREACHES.

2011 NATIONAL SMALL BUSINESS STUDY

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Incident Response. Six Best Practices for Managing Cyber Breaches.

Cybersecurity. Are you prepared?

BSHSI Security Awareness Training

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Malware & Botnets. Botnets

DATA AND PAYMENT SECURITY PART 1

Cybercrime: risks, penalties and prevention

Transcription:

How-To Guide: Cyber Security Content Provided by

Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses that create, collect, store, or process any of the following types of information. Intellectual property Payment info e.g. ACH, banking, or credit cards Private information about your company's principals Access to a business partner's web site Client names or records Patient medical records Sensitive info e.g. merger or acquisition data Personally identifiable information

Who is responsible for protecting me from cyber threats? Within the company: Information Technology (could be outsourced) Human Resources Legal and Compliance (internal/external) Finance Public Relations Internal Audit Information Security Officer (for larger companies) Outside the company: Federal and state authorities Industry groups Ultimately the liability always will fall to the business owner and the risk will fall to investors, shareholders, employees, and clients.

My business is small. Why would anyone want my data? Today cyber crime is now financially motivated and highly organized. Their tools are sophisticated. Cybercriminals, like bullies, prey on the easiest targets with the weakest security, such as small businesses. What I have Who would want it? Why? Intellectual property info Organized criminals/ Hackers Extortion and/or financial gain Client names & information, including payment info Computers, smart phones, email, social media Disgruntled employees Opportunistic employees Identity theft Payment fraud NOW WHAT? Healthcare information Competitors Medical insurance fraud Account details (userid/passwords for email, social media sites) Thieves Spread malware

The impact of stolen data While there are many impacts to cyber security, ultimately cyber incidents cost individuals, business owners, and the economy. In 2012 alone, cyber crime cost U.S. businesses $1 trillion. What is the impact? Reputation & brand image issues Legal action & associated costs Violation of industry rules e.g. PCI-DSS SO WHAT? Cyber security incidents cost cost Violation of federal laws e.g., HIPAA Loss of R&D time & money

How does cyber crime occur? Small businesses rely on technology Vulnerabilites are discovered for all systems Unprotected technologies are exploited Malware hacks email & social media accounts with weak passwords to spread itself Vulnerable systems are hijacked or owned by malware Hackers create malicious code (malware) to discover unprotected technologies Malware collects sensitive information and sends it to criminals Criminals use information to steal for financial gain

There s a problem. Now what? There are 3 simple steps that a company can take to reduce the risk of cyber crime and incidents. STEP ONE: Conduct a cyber self-assessment. This will include: Documenting your information assets Identifying whether you have any regulatory or contractual obligations Measuring cyber security incident readiness Validating essential countermeasures Assess Monitor Respond

Cyber self-assessment considerations What data do you collect, store, process, or transfer? Who has access to it? What devices is/could it be stored on? What do you do if you lose it? If you lose it, do you need to let anyone know? What if an employee leaves your company? What if confidential data is emailed or uploaded to social media or other sites by mistake? How will you be able to assist the authorities in the event of a breach?

What happens after the assessment? Once you have determined that risk exists, you need to be able to respond to it. Monitor Assess Respond STEP TWO: Cyber assessment response: Identify who will need access and how much access Develop a security and privacy policy that will protect your business in the event of an incident Educate everyone in your business to know what to do in the event of an incident Ensure that your technology environment has the basic countermeasures in place to respond to an incident

Cyber assessment response considerations Have you developed a security policy? Has the policy been communicated to all employees? Have your employees confirmed in writing that they understand the policies and the limitations? Do you have privacy policies that inform your customers how you protect their data? Have your employees been trained to respond to an incident such as loss or theft of a USB drive or laptop or a hack? Have you ensured that your technology environment has the basic countermeasures in place to respond to an incident, such as antivirus on ALL machines (including MACs), encryption, and automated software updates and backups?

How do you monitor for cyber incidents? After assessing and responding, monitor for cyber incidents. STEP THREE: Once you understand where the risks are, you should consider policies and procedures to detect any: External malicious activity Unauthorized employee or partner access Problems with your technology Monitor Assess Respond

Cyber monitoring considerations With cyber security monitoring you should be able to: Watch for external access attempts to your network Determine if your cyber risks have changed Observe employees or contractors to ensure they are using the technologies and data as they should be Determine whether there are problems or vulnerabilities with your technology before an incident occurs

Cyber Security 101 IT is typically focused on operations, but cyber security is a dicipline that focuses on risk. The IT staff s top priority is NOT always security. Cyber security is based on 3 tenets: 1. Confidentiality Information is on a need-to-know basis 2. Integrity Change or alteration of data must be authorized 3. Availability Data must be there when you need it Cyber security professionals believe in Defense in Depth, meaning they never rely on one person or system to protect the business and the information it relies on to operate.

Simple CONFIDENTIALITY do s and don ts Confidentiality is: Disclosing information on a need-to-know basis means: DO: Ensure employee access is on a need-to-know basis Make sure everyone has their own account and password Keep passwords different and strong and DON T: Write your passwords down or share them with others Share company information with outsiders Assume emails and websites are secure because they say so

Simple INTEGRITY do s and don ts Integrity is: Making sure that any change of information is authorized means: DO: Update and patch antivirus and system software regularly Encrypt devices that store your company s data Have a process for changing important data and DON T: Automatically download software because it s free Use file-sharing or peer-to-peer networks for free music Assume any technology device is immune from malware

Simple AVAILABILITY do s and don ts Availability is: Making sure that the data you need to run your business is there when you need it means: DO: Have regular backups of data and keep them off site Consider computer locks, even in a shared office Plan for a natural disaster or technical incident and DON T: Assume the backup works unless you test it regularly Assume the data is deleted once you get rid of a device Assume your IT/email provider will be able to protect you

Defense in Depth 101 There are multiple layers that make up the technology we use. Defense in Depth requires security to be considered at every layer. Database Application Operating system DATA Hardware Network Physical and environmental

Kalki s SMB Cyber Self Assessment Does the business owner care about? Losing money Reputation & brand issues Legal action Industry rules Violation of federal laws Does the business have? Banking or payment info Intellectual property Client names or records Patient medical info Sensitive info Do you protect yourself with? Security policy Employee training Incident response plan Security technology Physical security If you answered yes to any of the questions above you should: Work with a qualified Cyber Security professional to assess your risk Have a set of documents that will protect you if you are audited Implement policies and procedures that allow you to detect and respond to incidents Not rely on a singe technology or software to save you!

Kalki Consulting Founded & based in New York, Kalki Consulting LLC provides cyber security services to small, medium and enterprise companies with independent cyber assessment, response and monitoring offerings. Kalki is committed to helping clients understand and manage their regulatory compliance and cyber exposure to a security incident. For additional information go to: Web: http://www.kalkiconsulting.com Twitter: @kalkiconsulting Facebook: https://www.facebook.com/kalkiconsulting Phone: 1-855-GO-KALKI (1-855-465-2554)