Safeway - Cyber Security

948 views
736 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
948
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Safeway - Cyber Security

  1. 1. CYBERSECURITY
  2. 2. Safeway emailsystems blockmore than3 millionspam messagesper month
  3. 3. One identityis stolen everythree seconds
  4. 4. One in 40householdswith minorchildren willexperience childidentity fraudat some pointduring theirchild’s lifetime
  5. 5. A stolenmedical identityhas 50x greaterstreet valuethan a stolenSocial Securitynumber orcredit card
  6. 6. It takes theaverage victiman estimated$500 and30 hours toresolve eachidentity theftcrime
  7. 7. According to theFederal TradeCommission,about 10 millionidentity theftincidents occurin the U.S.every year
  8. 8. Estimatesattributeabout 10% ofU.S. healthcarespending toinsurancefraud
  9. 9. Consumer fraudlosses fromphishing in 2012were estimatedat $1.5 billionworldwide
  10. 10. More than500 millionphishing emailsappear in userinboxes everyday
  11. 11. Spam accountsfor more than70% of allemail aroundthe globe
  12. 12. 12Spam &Phishing
  13. 13. 13SPAM – Not just a classic food favorite!•  SPAM is unsolicited email usuallycontaining advertising material•  Safeway email systems block over3 million SPAM messages a month•  Personal email systems such as gmail,hotmail, and yahoo are flooded by SPAMand do not have the same email protectionas your Safeway email account
  14. 14. 14What is Phishing?•  Trying to acquire information like passwords and credit carddetails by masquerading as a trustworthy entity in an email•  Phishing emails may contain links to websites that are infectedwith malware aimed at stealing important personal information•  United States businesses lose an estimated $2 billion per year astheir clients become victims
  15. 15. 1510%Opened Email OnlySafeway’s Phishing Test Results53%Unread / No Response37%Opened Email and Clicked on Link
  16. 16. 16What To Do When You See Phishing•  Always scrutinize email you receive–  If it looks suspicious, do not open the email–  Never click on links in suspicious looking email•  Report the email to the appropriate personnel
  17. 17. 17Identity Theft
  18. 18. 18Identity Theft Impact•  In the past year, fraudsters stole more than $21 billion from12.6 million victims of identity fraud in the United StatesVictim Every 3 SecondsA
  19. 19. 19IDENTITY THEFT IMPACT1 in 40households with minor children will experience childidentity fraud at some point during their child’s lifetime
  20. 20. 20Clues of Identity Theft•  Withdrawals from your bank account that you can’t explain•  You don’t get your bills or other mail•  Debt collectors call you about debts that aren’t yours•  You find unfamiliar accounts or charges on your credit report
  21. 21. 21Prevent Identity Theft•  Protect your Personally Identifiable Information (PII)–  Lock it–  Shred it–  Don’t post it online for everyone to see•  Monitor your finances–  Bank, Credit Card, etc. Statements–  Credit Reports•  One free per year –from each of the 3 agencies
  22. 22. 22What To Do If You Are A Victim•  Get a local police report•  Place a Fraud Alert with one of the Credit Reporting Agencies–  Free–  They must tell the other two (by law)•  www.IDTheftCenter.org•  www.FTC.gov (Federal Trade Commission)
  23. 23. 23Personal HealthInformation
  24. 24. 24Risk to PHI is Rapidly Increasing•  A stolen medical identity has 50x greater street value than astolen social security number or credit card•  Organized criminals use stolen identities for multi-billion-dollarhealthcare fraud schemes•  Individual thieves use stolen records to obtain free medicalservices, drugs, and health insurance
  25. 25. 25Gift Card Fraud
  26. 26. 26Detect and Avoid Gift Card Fraud•  Feel the package for the gift card inside•  Check the package for any alterations or tampering•  Inspect the seams and base of the package•  Inspect the glue on the back of the card•  Review activation slip to ensure the card is activated
  27. 27. 27ATM Skimming
  28. 28. 28ATM / Fuel Tampering•  Fake readers may look out of place–  Not like the other machines–  New & Shiny when everything else is worn down–  Protrudes from face of device•  Most are engineered to be flush•  Look for signs of tampering–  Pry marks
  29. 29. 29ProtectingYour Valuables
  30. 30. 30Golden Rule #1 to Prevent Theft•  Be vigilant and on the lookout for suspicious people–  No visible ID badge–  Not a familiar face? Look for a badge–  Loitering or snooping around work areas or around entry or exit doorsnot common to visitor traffic
  31. 31. 31Golden Rule #2 to Prevent Theft•  Don’t let anyone “Tailgate” into the building
  32. 32. 32Golden Rule #3 to Prevent Theft•  Secure your laptop and any other valuable company orpersonal items–  Use cable locks–  If you put it away, make sure the drawer is locked–  Anytime you leave your work space unattended•  Meetings•  Quick breaks•  Lunch
  33. 33. 33Golden Rule #4 to Prevent Theft•  Be smart about working from home–  Do not do company business on a personal computer–  If you take your laptop home, place it in the trunk or out of site whenyou first leave work – not when you get out of the car to run an errand
  34. 34. 34Protect Your Information•  Open with care: report phishing and spam•  Know what’s on your and your family’s credit reports•  Protect PHI like you would your credit card•  ATM Skimming: Be aware of your surroundings•  Lock up your computer and valuables
  35. 35. 35Questions

×