SMALL BUSINESS PRESENTATION



Similar documents
SMALL BUSINESS PRESENTATION

National Cybersecurity Awareness Campaign Families Presentation

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

October Is National Cyber Security Awareness Month!

Internet threats: steps to security for your small business

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

NATIONAL CYBER SECURITY AWARENESS MONTH

Data Security. So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How-To Guide: Cyber Security. Content Provided by

Building a Business Case:

National Cyber Security Month 2015: Daily Security Awareness Tips

Cyber Security Strategies for the Small Business Market

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

State of Security Survey GLOBAL FINDINGS

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Perspectives on Cybersecurity in Healthcare June 2015

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

Cybersecurity Best Practices

2011 NATIONAL SMALL BUSINESS STUDY

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

PCI Compliance for Healthcare

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

The Attacker s Target: The Small Business

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Into the cybersecurity breach

How To Protect Yourself From A Hacker Attack

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

Top 10 Tips to Keep Your Small Business Safe

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

National Cybersecurity Awareness Campaign. Kids Presentation

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

2012 Endpoint Security Best Practices Survey

PCI Compliance: Protection Against Data Breaches

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

Impact of Data Breaches

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC. October Sponsored by:

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cybersecurity Protecting Yourself, Your Business, Your Clients

AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES

Cybersecurity: What CFO s Need to Know

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

How To Protect Your Data From Being Hacked

Small businesses: What you need to know about cyber security

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority

EY Cyber Security Hacktics Center of Excellence

A practical guide to IT security

HEADS up. stop think connect

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

Data Access Request Service

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

Cyber Security Strategy

Information Assurance Branch (IAB) Cybersecurity Best Practice for Executive Level Managers

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Cybersecurity Awareness. Part 1

Transcription:

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION

ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing cybersecurity awareness campaign Stop.Think.Connect. to help Americans understand the risks that come with being online. Stop.Think.Connect. challenges the American public to be more vigilant about practicing safe online habits and persuades Americans to view Internet safety as a shared responsibility in the home, in the workplace, and in our communities.

SHARED RESPONSIBILITY For small business owners, business growth is the name of the game. It s important to establish a cybersecurity protocol early that can grow with your business to protect your most critical assets. Not only do businesses rely on technology to perform daily functions, but the Internet provides easy ways for businesses to stay connected and informed However, with these increased conveniences comes increased risks Many of the crimes that occur in real life are now facilitated through the Internet, including human trafficking, credit card fraud, identity theft, and embezzlement No country, industry, community, or individual is immune to cyber risks, and no single government agency, company, or individual can solve our cybersecurity challenges We all have to work together to secure cyberspace

DID YOU KNOW? In 2012, 50% of all targeted cyber-attacks were aimed at businesses with fewer than 2,500 employees 1 The largest growth area for targeted cyber-attacks in 2012 was businesses with fewer than 250 employees: 31% of all attacks targeted small businesses 2 44% of small businesses reported being the victim of a cyber-attack, with an average cost of approximately $9,000 per attack 3 Nearly 59% of U.S. small and medium sized businesses do not have a contingency plan that outlines procedures for responding to and reporting data breach losses 4 1. Symantec Internet Security Threat Report, April 2013 2. Ibid 3. 2013 Small Business Technology Survey, National Small Business Association 4. 4. www.staysafeonline.org, 2013

THE REALITY OF CYBER ATTACKS All businesses, regardless of size, are at risk. Small businesses may feel like they are not targets for cyber attacks either due to their size or the perception that they don't have anything worth stealing Only a small percentage of cyber attacks are considered targeted attacks, meaning the attacker group is going after a particular company or group of companies in order to steal specific data The majority of cyber criminals are indiscriminate; they target vulnerable computer systems regardless of whether the systems are part of a Fortune 500 company, a small business, or belong to a home user It s easy for small businesses to become lax in regards to their Internet security, thinking they re too small for hackers to bother with. However, according to the Minnesota Cyber Crime Task Force, these are the businesses which are squarely in the crosshairs of cyber criminals. -Dana Badgerow, President and CEO of the Better Business Bureau

SMALL BUSINESS BREACHES Small companies, which are making the leap to computerized systems and digital records, are attractive targets for hackers With limited budgets and few or no technical experts on staff, small businesses generally have weak security In 2010, the U.S. Secret Service and Verizon Communications Inc.'s forensic analysis unit, which investigates attacks, responded to a combined 761 data breaches, up from 141 in 2009. Of those, 63% were at companies with 100 employees or fewer Visa estimates about 95% of the credit-card data breaches it discovers are on its smallest business customers 2010 Breaches Reported to Verizon, Inc. and the U.S. Secret Service 27% of attacks targeted businesses with over 100 employees 63% of attacks targeted businesses with 100 or fewer employees

CYBER TIPS FOR YOUR BUSINESS Assess risk and identify weaknesses If you re sensitive information is linked to the Internet, then make sure you understand how it s being protected Create a contingency plan Establish security practices and policies to protect the sensitive information of your organization and its employees, patrons, and stakeholders. Educate employees Make sure that employees are routinely educated about new and emerging cyber threats and how to protect your organization s data. Hold them accountable to the Internet security policies and procedures, and require that they use strong passwords and regularly change them. Back up critical information Establish a schedule to perform critical data backups to ensure that critical data is not lost in the event of a cyber attack or natural disaster. Store all backups in remote locations away from the office, and encrypt sensitive data about the organization and its customers. Invest in data loss protection software. Secure your Internet connection Use and regularly update antivirus and antispyware software on all computers; automate patch deployments across your organization, use a firewall, encrypt data in transit, and hide your Wi-Fi network. Protect all pages on your public-facing websites. Create a continuity plan A continuity plan ensures that business continues to be performed during a wide range of emergencies, including localized acts of nature, accidents and technological or attack-related emergencies. Find templates for this type of plan at http://www.fema.gov/planning-templates

DO YOUR PART Consumers are taking notice of how businesses secure their data and are more willing to trust and reward businesses for good security practices. Nearly 85% of consumers in a recent survey said they would increase their shopping at a store known for good cybersecurity practices, while only 20% said they would continue shopping at a store that had a recent data breach. 1 As a business owner, you can earn customer loyalty by promoting the security practices that you have implemented to protect their data. The losses resulting from cyber crimes, which can severely damage a business s reputation, often outweigh the costs associated with the implementation of a simple security program. By implementing a security program that involves both technical controls and cultural adjustments, small businesses can take a big step in fighting cyber crime. 1. Javelin Strategy & Research

CALL TO ACTION Cybersecurity is a shared responsibility that all Americans must embrace to keep the Nation secure in the 21st Century. Become an advocate in your community to help us educate and empower the American public to take steps to protect themselves online. How to get involved: Become a Friend of the Campaign by visiting www.dhs.gov/stopthinkconnect. Make cybersecurity a priority. Discuss safe online practices with your fellow employees. Inform your community about the Stop.Think.Connect. Campaign and the resources available. Blog or post about the issue of cybersecurity and the Stop.Think.Connect. Campaign. Host a cybersecurity activity in your office. Download and distribute Stop.Think.Connect. materials, such as the brochure, bookmark, and poster, to your employees.

SECURING CYBERSPACE STARTS WITH YOU