SlideShare a Scribd company logo
1 of 27
Loopholes and
Vulnerabilities in Data
Security
Are you ready to accept your cyber
liability?
Laird Rixford / @lrixford
President
My Previous Job
Network nerd
Trusted Advisor
What do you have to lose?
Sorry to Scare You…
• In case of a security breach you could be
• Subject to $1,000 to $100,000 per incident
• Qualify each piece of breached data as a separate
incident
• Required to notify individuals and media of
breach
• Required to provide monitoring or
remuneration to affected parties
• Applies to all agents. Not just health.
What is Your Data Worth?
• Financial data is $5/record
• Health data is worth $50/record
• Identity theft data is worth $188/record
Security and Confidentiality
Laws
• Health Insurance Portability and Accountability
Act (HIPAA)
• Health Information Technology for Economic
and Clinical Health (HITECH)
• Payment Card Industry Data Security Standard
(PCI DSS)
• Sarbanes–Oxley Act of 2002 (SOX)
• Gramm–Leach–Bliley Act (GLBA)
• State and Federal Laws
• Cyber Liability, Professional Liability, Errors and
Omissions Policies
• Carrier Contracts
What is Considered PII?
• Name
• Address
• Birthday
• Social security number
• Drivers license number
• Financial information
• Email
• Health information
Ease of Access = Less
Security
More difficult to access, more security
Points of Entry
• Physical
• Technology infrastructure
• Remote access
• Phone system
• Cloud and vendor products and services
• Employees
Mitigating the Threat
Mitigate, not prevent
Physical Access
Physical access is full access
Physical Access
• Limit access to critical areas
• Anywhere with a computer or access to
security infrastructure is critical
• Secure servers in a locked cabinet
• Security cameras
• Security system
• Even alarm inner doors during business hours
Technology
Infrastructure
An easy target
Technology Infrastructure
• New machines are cheap
• Update and patch
• Operating systems
• Software
• Firewalls
• Run supported software
• Encrypt mobile devices
• Use high security Wi-Fi (WPA2-PSK or Enterprise
RADIUS)
• System policies
• Disable USB storage
• Force password change
• Force screen saver lock
• Install prevention
Remote Access
Remote Desktop, Thermostats, VPN, Oh MY!
Remote Access
• Do you or your employees really need it?
• How often do you use it?
• Turn it on only when you need it
• Use two-factor authentication
• DUO
• RSA Key
Phone System
The oldest hack
Phone System
• Prevent remote access
• Change password often
• Enable remote extensions only as needed
Cloud & Vendor
Services
Their security is your security
Cloud & Vendor Services
• Request security audit results
• Use offerings meant to increase security
• Change password
• Two-factor authentication
• Remove unused users
• Leave vendors who do not comply
• Ask for Business Associate Agreement
Employees
The best hack
Employees
• Users do not like security
• Train users as to importance of security and
how to recognize social engineering
• Security begins and end with them; include
them in the conversation
Security Costs Money,
A Hack Costs More
You are a target. Act accordingly.
More Security = Less
Threat
The harder you make it, the less you are a target.
Suggestions
• Create a security program
• Longer passwords are better
• Change passwords often
• Use authentication that changes
• Hire an IT professional to secure your
network
• Keep all software patched and up to date
• Lower your attack profile
• Encrypt everything
Cyberliability Policy
• Do you need one?
• What coverage should you get?
Thank You
Don’t forget to fill out your surveys!
Laird Rixford / @lrixford
President

More Related Content

More from Insurance Technologies Corporation (ITC)

More from Insurance Technologies Corporation (ITC) (20)

SEO in 2019...and Beyond!
SEO in 2019...and Beyond!SEO in 2019...and Beyond!
SEO in 2019...and Beyond!
 
Email Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around ThemEmail Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around Them
 
ITC AgencyBuzz
ITC AgencyBuzzITC AgencyBuzz
ITC AgencyBuzz
 
Answering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website DesignAnswering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website Design
 
How to Write the Perfect Insurance Email
How to Write the Perfect Insurance EmailHow to Write the Perfect Insurance Email
How to Write the Perfect Insurance Email
 
Blogging Your Way to Local SEO Success
Blogging Your Way to Local SEO SuccessBlogging Your Way to Local SEO Success
Blogging Your Way to Local SEO Success
 
Common Misconceptions About Email Marketing
Common Misconceptions About Email MarketingCommon Misconceptions About Email Marketing
Common Misconceptions About Email Marketing
 
Search Marketing For The Short And Long Term
Search Marketing For The Short And Long TermSearch Marketing For The Short And Long Term
Search Marketing For The Short And Long Term
 
Using the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing StrategyUsing the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing Strategy
 
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
 
All Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive AutomationAll Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive Automation
 
How to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead GeneratorHow to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead Generator
 
10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making
 
Think Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance AgentsThink Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance Agents
 
How Do You Know if Your Website Needs to be Updated?
How Do You Know if Your Website Needs to be Updated?How Do You Know if Your Website Needs to be Updated?
How Do You Know if Your Website Needs to be Updated?
 
Email Marketing: The Agency Newsletter and Beyond
Email Marketing: The Agency Newsletter and BeyondEmail Marketing: The Agency Newsletter and Beyond
Email Marketing: The Agency Newsletter and Beyond
 
Are You Missing the Mark? Email Marketing Opportunities You May Be Missing Ou...
Are You Missing the Mark? Email Marketing Opportunities You May Be Missing Ou...Are You Missing the Mark? Email Marketing Opportunities You May Be Missing Ou...
Are You Missing the Mark? Email Marketing Opportunities You May Be Missing Ou...
 
Band For Your Buck: Underused Features of Your Insurance Website
Band For Your Buck: Underused Features of Your Insurance WebsiteBand For Your Buck: Underused Features of Your Insurance Website
Band For Your Buck: Underused Features of Your Insurance Website
 
Ask Me Anything: Bob Ingram of Peachstate Insurance
Ask Me Anything: Bob Ingram of Peachstate InsuranceAsk Me Anything: Bob Ingram of Peachstate Insurance
Ask Me Anything: Bob Ingram of Peachstate Insurance
 
The Bare Necessities: Your Homepage Checklist
The Bare Necessities: Your Homepage ChecklistThe Bare Necessities: Your Homepage Checklist
The Bare Necessities: Your Homepage Checklist
 

Recently uploaded

What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
srcw2322l101
 
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Pusat Herbal Resmi BPOM
 
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
yulianti213969
 
Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
CaitlinCummins3
 

Recently uploaded (20)

Sex service available my WhatsApp number 7374088497
Sex service available my WhatsApp number 7374088497Sex service available my WhatsApp number 7374088497
Sex service available my WhatsApp number 7374088497
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
Space Tech Expo Exhibitor List 2024 - Exhibitors Data
Space Tech Expo Exhibitor List 2024 - Exhibitors DataSpace Tech Expo Exhibitor List 2024 - Exhibitors Data
Space Tech Expo Exhibitor List 2024 - Exhibitors Data
 
Beyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic AccountingBeyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic Accounting
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdfProgress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
 
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In HarareTop^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
 
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
 
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
 
Most Visionary Leaders in Cloud Revolution, Shaping Tech’s Next Era - 2024 (2...
Most Visionary Leaders in Cloud Revolution, Shaping Tech’s Next Era - 2024 (2...Most Visionary Leaders in Cloud Revolution, Shaping Tech’s Next Era - 2024 (2...
Most Visionary Leaders in Cloud Revolution, Shaping Tech’s Next Era - 2024 (2...
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
How Bookkeeping helps you in Cost Saving, Tax Saving and Smooth Business Runn...
How Bookkeeping helps you in Cost Saving, Tax Saving and Smooth Business Runn...How Bookkeeping helps you in Cost Saving, Tax Saving and Smooth Business Runn...
How Bookkeeping helps you in Cost Saving, Tax Saving and Smooth Business Runn...
 
Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
 
Should Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their BookkeepingShould Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their Bookkeeping
 
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjwSCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
 
WAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdfWAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdf
 
10 Easiest Ways To Buy Verified TransferWise Accounts
10 Easiest Ways To Buy Verified TransferWise Accounts10 Easiest Ways To Buy Verified TransferWise Accounts
10 Easiest Ways To Buy Verified TransferWise Accounts
 
The Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and UncertaintyThe Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and Uncertainty
 
Unlocking Growth The Power of Outsourcing for CPA Firms
Unlocking Growth The Power of Outsourcing for CPA FirmsUnlocking Growth The Power of Outsourcing for CPA Firms
Unlocking Growth The Power of Outsourcing for CPA Firms
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 

Cyberliability, Loopholes and Vulnerabilities in Data Security - Laird Rixford, ITC

  • 1. Loopholes and Vulnerabilities in Data Security Are you ready to accept your cyber liability? Laird Rixford / @lrixford President
  • 3. Trusted Advisor What do you have to lose?
  • 4. Sorry to Scare You… • In case of a security breach you could be • Subject to $1,000 to $100,000 per incident • Qualify each piece of breached data as a separate incident • Required to notify individuals and media of breach • Required to provide monitoring or remuneration to affected parties • Applies to all agents. Not just health.
  • 5. What is Your Data Worth? • Financial data is $5/record • Health data is worth $50/record • Identity theft data is worth $188/record
  • 6. Security and Confidentiality Laws • Health Insurance Portability and Accountability Act (HIPAA) • Health Information Technology for Economic and Clinical Health (HITECH) • Payment Card Industry Data Security Standard (PCI DSS) • Sarbanes–Oxley Act of 2002 (SOX) • Gramm–Leach–Bliley Act (GLBA) • State and Federal Laws • Cyber Liability, Professional Liability, Errors and Omissions Policies • Carrier Contracts
  • 7. What is Considered PII? • Name • Address • Birthday • Social security number • Drivers license number • Financial information • Email • Health information
  • 8. Ease of Access = Less Security More difficult to access, more security
  • 9. Points of Entry • Physical • Technology infrastructure • Remote access • Phone system • Cloud and vendor products and services • Employees
  • 12. Physical Access • Limit access to critical areas • Anywhere with a computer or access to security infrastructure is critical • Secure servers in a locked cabinet • Security cameras • Security system • Even alarm inner doors during business hours
  • 14. Technology Infrastructure • New machines are cheap • Update and patch • Operating systems • Software • Firewalls • Run supported software • Encrypt mobile devices • Use high security Wi-Fi (WPA2-PSK or Enterprise RADIUS) • System policies • Disable USB storage • Force password change • Force screen saver lock • Install prevention
  • 15. Remote Access Remote Desktop, Thermostats, VPN, Oh MY!
  • 16. Remote Access • Do you or your employees really need it? • How often do you use it? • Turn it on only when you need it • Use two-factor authentication • DUO • RSA Key
  • 18. Phone System • Prevent remote access • Change password often • Enable remote extensions only as needed
  • 19. Cloud & Vendor Services Their security is your security
  • 20. Cloud & Vendor Services • Request security audit results • Use offerings meant to increase security • Change password • Two-factor authentication • Remove unused users • Leave vendors who do not comply • Ask for Business Associate Agreement
  • 22. Employees • Users do not like security • Train users as to importance of security and how to recognize social engineering • Security begins and end with them; include them in the conversation
  • 23. Security Costs Money, A Hack Costs More You are a target. Act accordingly.
  • 24. More Security = Less Threat The harder you make it, the less you are a target.
  • 25. Suggestions • Create a security program • Longer passwords are better • Change passwords often • Use authentication that changes • Hire an IT professional to secure your network • Keep all software patched and up to date • Lower your attack profile • Encrypt everything
  • 26. Cyberliability Policy • Do you need one? • What coverage should you get?
  • 27. Thank You Don’t forget to fill out your surveys! Laird Rixford / @lrixford President

Editor's Notes

  1. Ask questions…77% say their company is safe from cyber threats 66% say they are not concerned with hackers, cyber-criminals, or even employees stealing data 47% believe a data breach would have no impact on their business https://www.staysafeonline.org/business-safe-online/resources/
  2. 71% of data breaches target small businesses 96% of data breaches target payment card data
  3. Do any of these required fields look familiar to an agent?
  4. Doors, Server Room, Desktops
  5. Using cameras to socially engineer or steal passords.
  6. Wi-Fi (hide SSID, MAC, limiting pools), Operating Systems, Software, Firewalls, Mobile Devices (Laptops, Tablets, Phones), Crack windows login. XBOX/PS DDOS of Firewall. Dont allow you to be a point of contact either.
  7. Updates to OS, Software, Firewalls. Mobile devices encrypted storage. Crack windows login.
  8. Remote Desktop GoToMyPC VPN
  9. Two factor. Access = security hole.
  10. VOIP, Conference Bridges, Long Distance Calling, Paging
  11. Someone could just take a phone home and call from home.
  12. Focus on security? Security audits? Save password is bad. Require local install of data.
  13. Save password is bad. Require local install of data.
  14. Disgruntled Employee, Unethical Employee, What is social engineering? Other vulnerabilities can be exploited to leverage social engineering.
  15. 60% of small businesses close within six months of experiencing a data breach
  16. SMB Security Program Status:87% do not have a formal written security policy 59% do not have a security incident response plan for a data breach 50% of users still use poor passwords 83% do not have a system to require employees to periodically change passwords