RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Similar documents
Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Cybersecurity. Are you prepared?

NATIONAL CYBER SECURITY AWARENESS MONTH

Internet threats: steps to security for your small business

Cybersecurity Awareness. Part 1

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared?

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

What Data? I m A Trucking Company!

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

CKAHU Symposium Cyber-Security

CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC. October Sponsored by:

Cyber Threats: Exposures and Breach Costs

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Collateral Effects of Cyberwar

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

BE SAFE ONLINE: Lesson Plan

FACT SHEET: Ransomware and HIPAA

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Protecting your business from fraud

INFORMATION SECURITY FOR YOUR AGENCY

Who s Doing the Hacking?

Data Security Incident Response Plan. [Insert Organization Name]

2012 Endpoint Security Best Practices Survey

Perspectives on Cybersecurity in Healthcare June 2015

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Defending Against Data Beaches: Internal Controls for Cybersecurity

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cyber-Crime Protection

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Presented by: Islanders Bank

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

Create Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum

Security Best Practices for Mobile Devices

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Common Cyber Threats. Common cyber threats include:

KEY STEPS FOLLOWING A DATA BREACH

How-To Guide: Cyber Security. Content Provided by

Cybersecurity Workshop

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Common Data Breach Threats Facing Financial Institutions

A Case for Managed Security

Current Threat Scenario and Recent Attack Trends

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

Cyber Security. Securing Your Mobile and Online Banking Transactions

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Data Breaches and Cyber Risks

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE

Privacy Rights Clearing House

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Cybersecurity for the C-Level

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

Security A to Z the most important terms

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

CSUF Tech Day Security Awareness Overview Dale Coddington, Information Security Office

Infocomm Sec rity is incomplete without U Be aware,

Transcription:

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses

Copyright Materials This presentation is protected by US and International Copyright laws. Reproduction, distribution, display and use of the presentation without written permission of the speaker is prohibited. RLI Professional Services Group

Course Description The National Small Business Association (NSBA), in its 2014 Year-End Economic Report, found that half of all small businesses report they have been the victim of a cyber-attack up from 44 percent just two years ago. Hackers are increasingly becoming more sophisticated. Phishing schemes are on the rise and ransomware is one of the newest threats to all businesses. There is a cost to every cyber-attack whether it s money, data, and/or loss of time and resources. Join us for this cybersecurity update and learn more about what threats are out there lurking around your business waiting to attack your vulnerability. We ll also discuss best practices that you may consider in addressing your business s cyber security issues.

Learning Objectives Identify and define key cybersecurity threats to small businesses Explore specific examples of real cybersecurity threats Understand where small businesses can find credible resources to protect their business

Brief Overview Malware Phishing Social Engineering Malicious Spam What Hackers Thieves Who Employees Mobile Technologies Weak Passwords Vendors Point of Entry

Privacy Breach Notification costs Forensics Crisis response Credit monitoring Legal fees Call center services Defense costs and settlement expenses Regulatory fines and/or assessments

Malware Defined Malware is malicious software that works to take full control of a victim s computer and encrypt all files that are stored on the machine, rendering it unusable and inaccessible without the encryption key. Includes: Computer viruses Worms Trojan horses

Phishing Example Unknown company or email address Grammar errors Links in email Popular Company

Red Flags in Phishing Emails Spelling errors Grammar errors Links in email Threats Spoofing popular websites or companies Using web addresses similar to well-known companies Microsoft Safety and Security Center

Ransomware Defined Ransomware is a form of malicious software that locks and restricts access to the infected computer. The malicious software will then display a message that demands a ransom or payment to remove the restriction.

Ransomware Some Statistics Ransomware attacks more than doubled in 2014, from 4.1 million in 2013, to 8.8 million File-encrypting ransomware ( cryptoransomware ) grew from 8,274 in 2013 to 373,342 in 2014 Symantec Internet Security Threat Report, April 2015

Crypto-Ransomware As a threat, Crypto-Ransomware grew exponentially at 45 times greater in 2014 over 2013: Cryptolocker Cryptodefense Cryptowall Symantec Internet Security Threat Report, April 2015

Cryptolocker Claim Scenario: Cryptolocker virus detected by IT Request for employee to shut down system occurred within 10 minutes of detection IT confiscated laptop Employee had no access to files on hard drive Outcome: 4 days to recover files from hard drive Costs? 4 days of reduced productivity Time and expense for IT department to recover data Loss of IT resources during recovery

Social Engineering Defined Social Engineering means (in the context of security) the art of manipulating people to divulge confidential information. e-commerce involving targeting servers and backend databases Malware is hosted on web servers and distributed by phishing attacks or driveby downloads

Point of Entry: Employees Studies show that 30% of data breaches result from human error or negligence

Point of Entry: Mobile Technologies 100% of mobile applications tested by Trustwave for their 2014 Global Security Report had at least 1 vulnerability

Point of Entry: Weak Passwords Weak passwords contributed to 31% of compromises investigated by Trustwave for their 2014 Global Security Report

Point of Entry: Vendors In 46% of incident response investigations, a major component of IT support was outsourced to a third party responsible for system support Trustwave 2014 Global Security Report

Resources Federal Communications Commission Small Biz Cyber Planner 2.0 Privacy and Data Security Scams and Fraud Network Security Website Security Email Mobile Devices Employees Facility Security Operational Security Payment Cards Incident Response and Reporting Policy Development, Management https://www.fcc.gov

Snapshot: Federal Communications Commission Small Biz Cyber Planner 2.0

Snapshot: Federal Communications Commission Small Biz Cyber Planner 2.0 Description of Topic Question Click

Snapshot: Federal Communications Commission Small Biz Cyber Planner 2.0 Don t forget to consult with a qualified cyber security professional

Resources Federal Trade Commission- The Red Flags Rule The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the warning signs or red flags of identity theft in their day-to-day operations. https://www.ftc.gov

Resources www.fcc.gov www.ftc.gov Legal counsel Your broker Your insurance company

This concludes the Professional Services Group Learning Event Laurel Tenuto, Client Risk Management Coordinator Laurel.Tenuto@lrlicorp.com Marie Bernier, Senior Risk Management Consultant, Specialty Products Client Solutions Marie.Bernier@rlicorp.com

THANK YOU!