• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Safeway - Cyber Security
 

Safeway - Cyber Security

on

  • 342 views

 

Statistics

Views

Total Views
342
Views on SlideShare
342
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Safeway - Cyber Security Safeway - Cyber Security Presentation Transcript

    • CYBERSECURITY
    • Safeway emailsystems blockmore than3 millionspam messagesper month
    • One identityis stolen everythree seconds
    • One in 40householdswith minorchildren willexperience childidentity fraudat some pointduring theirchild’s lifetime
    • A stolenmedical identityhas 50x greaterstreet valuethan a stolenSocial Securitynumber orcredit card
    • It takes theaverage victiman estimated$500 and30 hours toresolve eachidentity theftcrime
    • According to theFederal TradeCommission,about 10 millionidentity theftincidents occurin the U.S.every year
    • Estimatesattributeabout 10% ofU.S. healthcarespending toinsurancefraud
    • Consumer fraudlosses fromphishing in 2012were estimatedat $1.5 billionworldwide
    • More than500 millionphishing emailsappear in userinboxes everyday
    • Spam accountsfor more than70% of allemail aroundthe globe
    • 12Spam &Phishing
    • 13SPAM – Not just a classic food favorite!•  SPAM is unsolicited email usuallycontaining advertising material•  Safeway email systems block over3 million SPAM messages a month•  Personal email systems such as gmail,hotmail, and yahoo are flooded by SPAMand do not have the same email protectionas your Safeway email account
    • 14What is Phishing?•  Trying to acquire information like passwords and credit carddetails by masquerading as a trustworthy entity in an email•  Phishing emails may contain links to websites that are infectedwith malware aimed at stealing important personal information•  United States businesses lose an estimated $2 billion per year astheir clients become victims
    • 1510%Opened Email OnlySafeway’s Phishing Test Results53%Unread / No Response37%Opened Email and Clicked on Link
    • 16What To Do When You See Phishing•  Always scrutinize email you receive–  If it looks suspicious, do not open the email–  Never click on links in suspicious looking email•  Report the email to the appropriate personnel
    • 17Identity Theft
    • 18Identity Theft Impact•  In the past year, fraudsters stole more than $21 billion from12.6 million victims of identity fraud in the United StatesVictim Every 3 SecondsA
    • 19IDENTITY THEFT IMPACT1 in 40households with minor children will experience childidentity fraud at some point during their child’s lifetime
    • 20Clues of Identity Theft•  Withdrawals from your bank account that you can’t explain•  You don’t get your bills or other mail•  Debt collectors call you about debts that aren’t yours•  You find unfamiliar accounts or charges on your credit report
    • 21Prevent Identity Theft•  Protect your Personally Identifiable Information (PII)–  Lock it–  Shred it–  Don’t post it online for everyone to see•  Monitor your finances–  Bank, Credit Card, etc. Statements–  Credit Reports•  One free per year –from each of the 3 agencies
    • 22What To Do If You Are A Victim•  Get a local police report•  Place a Fraud Alert with one of the Credit Reporting Agencies–  Free–  They must tell the other two (by law)•  www.IDTheftCenter.org•  www.FTC.gov (Federal Trade Commission)
    • 23Personal HealthInformation
    • 24Risk to PHI is Rapidly Increasing•  A stolen medical identity has 50x greater street value than astolen social security number or credit card•  Organized criminals use stolen identities for multi-billion-dollarhealthcare fraud schemes•  Individual thieves use stolen records to obtain free medicalservices, drugs, and health insurance
    • 25Gift Card Fraud
    • 26Detect and Avoid Gift Card Fraud•  Feel the package for the gift card inside•  Check the package for any alterations or tampering•  Inspect the seams and base of the package•  Inspect the glue on the back of the card•  Review activation slip to ensure the card is activated
    • 27ATM Skimming
    • 28ATM / Fuel Tampering•  Fake readers may look out of place–  Not like the other machines–  New & Shiny when everything else is worn down–  Protrudes from face of device•  Most are engineered to be flush•  Look for signs of tampering–  Pry marks
    • 29ProtectingYour Valuables
    • 30Golden Rule #1 to Prevent Theft•  Be vigilant and on the lookout for suspicious people–  No visible ID badge–  Not a familiar face? Look for a badge–  Loitering or snooping around work areas or around entry or exit doorsnot common to visitor traffic
    • 31Golden Rule #2 to Prevent Theft•  Don’t let anyone “Tailgate” into the building
    • 32Golden Rule #3 to Prevent Theft•  Secure your laptop and any other valuable company orpersonal items–  Use cable locks–  If you put it away, make sure the drawer is locked–  Anytime you leave your work space unattended•  Meetings•  Quick breaks•  Lunch
    • 33Golden Rule #4 to Prevent Theft•  Be smart about working from home–  Do not do company business on a personal computer–  If you take your laptop home, place it in the trunk or out of site whenyou first leave work – not when you get out of the car to run an errand
    • 34Protect Your Information•  Open with care: report phishing and spam•  Know what’s on your and your family’s credit reports•  Protect PHI like you would your credit card•  ATM Skimming: Be aware of your surroundings•  Lock up your computer and valuables
    • 35Questions