Your SlideShare is downloading. ×
WHAT SHOULD YOUR CPA FIRM DO TO PROTECT ITSELF AND ITS CLIENTS FROM CYBER CRIME?<br />Cyber-crime is a catch-all phrase th...
Large percent of cyber attacks come from within the corporation by improper use of USB drives, incorrect downloading and E...
Traditional business interruption policies focus on damage caused by fire or flood and do not consider Cyber attacks at all.
Cyber-insurance policies require higher premiums and deductibles because of challenges such as lack of quantifiable data o...
Depending upon the size of the company and the coverage required, premiums can run into the hundreds of thousands of dolla...
Upcoming SlideShare
Loading in...5
×

Artk Consulting Cyber Risk For CPA Firm

627

Published on

CYBER RISK INFORMATION FOR THE CPA FIRM

1 Comment
0 Likes
Statistics
Notes
  • Best PPD/CPA Networks - Check More on: BestAffNetworks .com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
627
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
9
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Artk Consulting Cyber Risk For CPA Firm"

  1. 1. WHAT SHOULD YOUR CPA FIRM DO TO PROTECT ITSELF AND ITS CLIENTS FROM CYBER CRIME?<br />Cyber-crime is a catch-all phrase that encompasses hacking into computers, creating and spreading computer viruses, perpetrating online fraud schemes, and stealing trade secrets and other intellectual property. Cyber-crime lawsuits are on the increase, making insurance more important than ever. <br />As a CPA’s you also work as forensic accountants, meaning it is their job to detect fraud or other crime in the financial world.  Some certified public accountants even use their expertise to design helpful computer software for to assist in detecting Cyber Risks.<br />By law, a CPA has the duty to protect our client data. It’s important that we understand our physical security risks, know what risk points exist for exposure of client data and enforce a plan WISP (Written Information Security Plan) to keep key systems properly updated and staff up to date on security best practices. <br />So what is a Cyber Risk? <br />A Cyber-risk began as an industry-specific need, mainly for e-commerce and Internet-related companies, but has now become main stream. New viruses, hackers, and denial of service (DoS) attacks, attempt to steal company information and sell it to the highest bidder. Computer network security and risk management issues is no longer the exclusive domain of companies doing business over the Internet, and today risks are not limited to outside threats or Internet access. <br /><ul><li>Many CPA companies now realize that just having a website may carry additional, unforeseen risks.
  2. 2. Large percent of cyber attacks come from within the corporation by improper use of USB drives, incorrect downloading and Email procedures and disgruntle employees. </li></ul>Most incidents of cyber-crime go unreported because the individuals and businesses affected want to avoid the negative publicity. <br />Personal Information Privacy Policy (WISP) <br />Personal Information Privacy Policy what is Mass Bill 201 CMR 17?<br />The Massachusetts data security regulations require that businesses develop, implement and maintain a comprehensive written data security program to protect the "Personal Information" of Massachusetts residents. The program contemplated under the regulations requires, among other things, identifying risks to Personal Information and evaluating safeguards, appointing an employee or employees to maintain the program, developing written security policies for electronic and physical files, and regularly monitoring the program. These regulations must be implemented even if security problems never arise. <br />Who does this affect?<br />All persons who store or manage Massachusetts residents' Personal Information are affected.<br />How do I know if I am affected?<br />If you or your business stores ANY physical files OR electronic data, which contain a Massachusetts resident's Personal Information, including data stored on computers, laptops, external media, Internet, or even in a filing cabinet, you are required to comply with the CMR 17 regulations.<br />Why was this law passed?<br />We have all heard about the data breaches experienced by large companies such as TJX and costs related to the security breach, including class-action litigation arising from the damages caused to the individuals whose identity was stolen. Small to mid-size businesses are not expected to take the same steps a company such as TJX would need to take in order to protect Personal Information. However, if there is an audit or a security breach, the chances of liability increase greatly for companies who did not take reasonable steps to comply with the law and regulations.<br />When is the deadline?<br />The deadline for WISP compliance is now March 1, 2010.<br />What is a WISP?<br />WISP is Written Security Information Program, which details steps you have taken and procedures you have implemented to ensure compliance with the CMR 17 requirements. This document will list person(s) responsible for keys to cabinets, policy procedures for storing and processing personal data, personnel security level on the network, anti-virus licensing expiration management, firewall administration and security level, and various aspects of the necessary documentations.<br />How do I become compliant?<br />Through a coordinated effort utilizing software and business processes, we can help you take the steps necessary to comply with 201 CMR 17.00, so to ensure that no one else will have access to your data! <br />Cyber Insurance, does your company need to have it?<br /><ul><li>In general, traditional insurance-- property, commercial liability, and crime-tend to focus on tangible damage to physical property and do not address cyber-risk.
  3. 3. Traditional business interruption policies focus on damage caused by fire or flood and do not consider Cyber attacks at all.
  4. 4. Cyber-insurance policies require higher premiums and deductibles because of challenges such as lack of quantifiable data on cyber-risk.
  5. 5. Depending upon the size of the company and the coverage required, premiums can run into the hundreds of thousands of dollars.
  6. 6. If an insurer's assessment does not find appropriate levels of computer network security, the policy may be denied unless the applicant meets the insurer's recommended security specifications. Additional services, such as yearly vulnerability assessments, which monitor and alert management about potential problems, are also offered. In meeting an insurer's standards, companies should be wary of investments in expensive, tactical, one-time solutions that aren't in line with their short-or long-term objectives. </li></ul>Types of Cyber-Coverage need to be addressed by your companies:<br /><ul><li>Liability First-party liability - Covers a company’s own losses due to damage to availability, integrity, and confidentiality of company data, intellectual property, and other privacy infringement-related issues. .
  7. 7. Business interruption, income, and expenses - These policies cover a company's loss of revenue and additional expenses caused by DoS attacks, viruses, hackers, and fraud. They may also cover a company's losses incurred as a result of disruption caused by the computer systems of others relied on.
  8. 8. Product or service failure - This cyber-coverage covers legal actions attributable to the failure of a product or service.
  9. 9. Extortion - Such a policy covers ransom for valuable information.
  10. 10. Crisis management - This coverage applies to expenses to facilitate recovery of losses, as well as to support public relations efforts to communicate with constituents. </li></ul>Insurers also offer packages that may include coverage for criminal reward as well as loss of revenue. <br />What Is the Right Risk Management Mix? <br />Because insurance will not avoid a lawsuit nor will it put a company back in business immediately, cyber-insurance usually requires additional investments in controls and infrastructure before a policy is underwritten. Because small and medium-size companies need to use their resources wisely, they are especially at risk. <br />A company needs to determine its acceptable level of business risk. Although buying insurance may reduce the company's risk, this solution should be in line with the company's own goals and risk assessment. Many small and medium-sized businesses may decide to forego cyber-insurance because of cost considerations, but often these determinations are not made based on a business-driven risk management strategy. <br /> “So how do you keep your firm and your clients protected? Here are some things to consider”<br />Server SecurityIf your servers are located in your office, new legislation, like the freshly minted (as of March 1, 2010) Massachusetts 201 CMR 17, requires that they be behind a secure locked door with restricted access and locks on the server cases, cabinets, drive chassis and server console screen. Or if your servers are hosted offsite at a data center, it’s best to ensure that all of the physical security requirements are being met based on your needs.<br />Confidential DataIn theory, CPA firms securely shred everything. In practice, someone could likely find a wealth of information they shouldn’t have access to just by going dumpster diving. Does your firm actively enforce a confidential data policy that addresses paper copies of confidential data?<br />Password SecurityIt is important to educate your firm on the importance of using secure passwords and keeping them secure by not writing them down. <br />Microsoft PatchesStaying up to date with Microsoft patches is a critical step in ensuring your firm’s security. We recommend using automated patch management like IBM for Internet Security solutions<br />Web SiteAnother thing to consider is what information you post on your Web site. A CPA firm love to publish everyone’s name, phone number and e-mail address, which are helpful for the general public, but makes it one step easier for someone to get into your network. <br />If you find this concerning, consider including a contact number and generic e-mail address for each department to add one more layer of protection for your firm.<br />Voice Mail SystemSecure passwords are important here too. You don’t want someone calling your office after hours, figuring out how to get a password prompt and then gaining access to someone’s voice mail because they used something like 1111, 1234, or 0000 as their password. This is another reason not to post everyone’s number online.<br />ISP RouterThe Internet Service Provider’s “managed router” is one of the most overlooked pieces of the network. It’s a nondescript box in the closet with blinking lights that few people understand. Somehow ignorance makes way for comfort. Most firms assume that because the ISP set it up, it must be configured correctly. Not true. <br />FirewallWhen is the last time your firewall was updated? Firewalls are found both in the server room and as a piece of software on your PC.<br />We also recommend using intrusion detection and prevention systems to protect your firm in addition to firewalls. Where firewalls passively block known attacks, these solutions are proactive in nature and will provide reporting on the number and types of attacks that are attempted<br /><ul><li>Remote AccessIn this day and age, the convenience of anytime, anywhere access to data poses new security threats that firms need to consider and address. Our duty to keep client data secure now extends far beyond the walls of the office and staff in the field to our employees’ homes and cell phones as well. It’s a good idea to develop a written policy for remote access.
  11. 11. EncryptionMost states have breach notification laws, and nearly all of them waive the requirement for notification where data has been encrypted. Whole disk and USB-stick encryption are the two most common places where encryption can be used. Imagine all of the free press you could get just by having an auditor lose their USB-memory stick.</li></ul>We encourage you to consider this list, as well as additional policies like third-party connection, acceptable use, and incident report, to ensure your firm is adequately protected on all fronts. Above all, make sure your firm actively enforces the policies and standards you establish because, no matter what kind of security you have in place, your firm is only as safe as your weakest line of defense<br />Data loss, ID theft top malpractice concerns!<br /> “We have even seen CPA client information stolen via dumpster diving."<br />In a rough economy, when liability claims against accountants tend to rise, it's especially critical for CPA firms to know exactly what their policy covers and to make any necessary adjustments. <br />"The hard issue right now is data loss, and every carrier is addressing it differently,” "For example, the American Institute of CPAs program and CPA Gold have both put out a cyber-security endorsement to their policies as a rider. Travelers took a different approach and just made changes to their base policy. Philadelphia has an endorsement which is sold as an additional premium, while some have not addressed the issue but are examining it to determine their position." <br /> “The issue of data loss is becoming commonplace:” <br />"We're seeing it on a weekly basis with potential claims coming in as a result of stolen laptops, security breaches, and the like. It can result in significant costs to accounting firms just to notify current and past clients when something like this happens believe us the last thing you want is to send out a letter to 3,000 people that they may be victims of a security breach because of you." <br /> <br />

×