SlideShare a Scribd company logo
1 of 7
Download to read offline
1 Summer 2014
Special
Report
Helping global families flourish for generations.
A Special Report for Clients of PANGEA Private Family Offices with Anwar Visram, CEO of Visram Security.
How cyber-secure is your family enterprise?
For private client use only
ā€œ
information being leaked from an unknown source. After many
weeks of investigation, it was determined that the source of the
leak was none other than Steveā€™s own laptop.
ā€
Who are the Targets?
Private wealth management, Family Ofļ¬ces, accounting and many
other ļ¬rms that have access to private and conļ¬dential information
of the high net worth clients are increasingly being targeted.
These businesses may be small in terms of the number of
employees they have, but their clients have billions of dollars
in assets, making them a large target.
Small businesses and high net worth families are particularly
prone to these types of attacks. In case you are wondering,
I group high net worth families with small businesses because
many of these families operate like a small business as they have
many people directly involved in their lives, from lawyers and
image consultants to assistants and cleaning staff. Your family
may not be a business per se, but you are still vulnerable.
Why are small businesses and high net worth families particularly
prone to cyber-attacks? Because very few businesses and families
have worked with a Reputation and Security Strategist that would
assist them in understanding all the risks they may be exposed to.
Not knowing the risks, most small businesses and families use the
very basic cyber- security protection, e.g., anti-virus or ļ¬rewalls.
They rarely have awareness training on the doā€™s and donā€™ts of
cyber-safety. They employ weak password protection mechanisms
and expose sensitive data without even knowing it. These are
just a few examples of common cyber-protection behaviours that
people think are sufļ¬cient to prevent cyber-attacks. In truth, small
businesses are often unprepared for cyber-attacks because they
donā€™t put the resources into protecting themselves.
Who are the Perpetrators?
As the types of cyber-threats evolve and become more
sophisticated, so do the types of cyber-criminals or ā€œactorsā€.
Among many actors in the cyber-crime space, the main four are:
1. Petty Criminal ā€“ Generally not well-funded or organized.
They just want to get in and out so they can sell what they
stole for money.
2. Hackavist/Cyber-Terrorist ā€“ Not well-funded but well-
organized. They set up political campaigns and target speciļ¬c
companies, organizations, or governments. A well-known e
xample of such an actor is the hacker group Anonymous, who
targeted ļ¬nancial companies because the group believed the
companies were responsible for the 2008 ļ¬nancial crisis.
3. Organized Crime ā€“ Well-organized and well-funded. They
use a variety of malware such as viruses, Trojans, ransomware
and botnets. These programs can inļ¬ltrate your computer,
corrupt it, and leave it vulnerable to future attacks. Financial
gain is the purpose of such attacks.
4. State-Sponsored Attackers ā€“ Elite hackers and hacker
groups hired by governments to steal state secrets and
other sensitive information or inļ¬‚ict damage on the internal
systems. They may also perform corporate espionage, or steal
conļ¬dential information and intellectual property to assist
ā€œfriendlyā€ companies. You may remember the highly publicized
ā€œStuxnetā€ attack against Iranā€™s nuclear facility an example.
ANWAR VISRAM
A Leading Canadian Reputation & Security
Strategist, Anwar is CEO of Visram Security.
He specializes in assisting high net worth families
& private wealth management ļ¬rms to protect
themselves from the rapidly growing cyber threat.
Questions for Anwar can be e-mailed to:
thought.leadership@pangeafamilyofļ¬ces.com
How cyber-secure
is your family enterprise?
Even wealth services providers are concerned about cyber-attacks
to access private client information.
You may think to yourself that this was just an isolated incident
and that this would never happen to you. Unfortunately, that is
precisely what Steve believed before this happened to Steve and
his law ļ¬rm.
If this little anecdote didnā€™t raise an internal alarm in you,
consider the following statistics.
Cyber-attacks in Numbers
Last year was an epic year for global data breaches as cyber-
criminals were busy stealing private and conļ¬dential client
information. It broke 2011ā€™s record for the number of pieces
of information exposed by 200%.
In Canada, it is estimated that there were seven million cyber
-victims last year. If you exclude children under the age of fourteen
that means one in four Canadians was a victim of a cyber-crime!
Bear in mind, these numbers only represent cyber-attacks that
have been reported. There are many more thousands of cyber-
attacks that go unreported each year, very much like the one
that involved Steveā€™s ļ¬rm.
Unlike in the years gone by when cyber-criminals looked to
make headlines, modern cyber-criminals prefer to work in ā€œstealthā€
mode. In fact, most cyber-breaches go unidentiļ¬ed for weeks,
months, or even years. Undetected, cyber-thieves can cause great
damage to their high net worth targets because they can exploit
the same security weaknesses and continue stealing valuable
information over and over again.
| PANGEA Private Family Offices
In 2013 alone, 822 million
records were exposed in
2,154 separate incidents and the
top three countries targeted
by cyber-criminals were the US,
United Kingdom, and Canada.1
www.pangeagamilyoffices.com Page 2 of 5
TM
When the Marvels of Tecnology Backļ¬re
Not only do we now have a variety of cyber-perpetrators, but
we also have a greater number of ways in which security can be
breached and your information can be stolen.
Do you, or someone you know, use a security company to
monitor the security of your home? You would probably never
think that such a service may present a cyber-security risk for you,
but you might change your mind after reading the following story.
I was speaking with an owner of a company that specializes in
environmental controls, home entertainment, and physical
security systems for the homes of high net worth clients. The
system that he was installing into these homes controls all the
features of the home: inside temperature, lighting, audio/video
media units, cameras, and electronic doors- luxury to be sure,
but one that could prove fatal.
The homeowners could access the system in three different
ways: from a single control panel within the home, over the
Internet using an Internet browser, or through a smartphone
app. Although the ease of access and the variety of options to
control the system delighted the customers of this home security
company, they had no idea what a terrible cyber-risk they were
exposed to!
Because the monitoring station is connected to all the clients
of this company, a breach at the monitoring station would result
in direct access to all of those clients. Criminals could monitor
their intended victim via the cameras for weeks, or even months,
undetected. At the opportune moment, they could disable
the alarm and open the doors for a perfect break-in, all via
the Internet.
I asked the owner of the company some basic questions, such
as what was in place to protect the customers from a cyber-at-
tack against the control system or if there was a way the system
would be able to monitor and alert the company if the security
system was breached? Unfortunately, he did not have a deļ¬nite
response to these questions and many more. In fact, I donā€™t
believe he had even considered some of the risks we discussed.
The challenge of the modern day is that we have fantastic
technology that allows us to do amazing things, but it also
leaves us vulnerable, particularly in areas we least expect it.
Many companies are embracing newer and newer technology
to innovate their products, yet they arenā€™t aware of the potential
negative consequences of doing so. In order to weigh the
consequences of remaining in the dark, I ask you to consider
the real cost of security breaches.
The Real Costs of Security Breaches
One common misconception is that the security breach in and
of itself is the main problem. However, though the breach itself
is terrible, the real devastation occurs during the fallout, the time
after the breach has been discovered and when steps are being
taken to recover. This recovery process is often a long road to
walk and not all come out on top.
One of the primary impacts will be to the victimā€™s reputation.
As Warren Buffet correctly suggests, ā€œIt takes 20 years to build a
reputation and only ļ¬ve minutes to ruin it. If you think about that,
youā€™ll do things differently.ā€ In addition, cyber-crime goes beyond
the irreparable damage to your family or a business reputation.
It often includes exposure of sensitive information, intellectual
property loss, cyber-espionage, identity theft, as well as losses
that impact third parties like friends, family, clients and customers.
You arenā€™t only putting yourself at risk-you endanger those close
to you, too.
Imagine for a moment your family was a victim of identity theft.
It would take criminals minutes to obtain your credit card
information and begin misusing your identity for their proļ¬t.
Before you ļ¬nish drinking a cup of your morning coffee, they
could destroy your credit rating that took you decades to establish.
How do you think clients of Steveā€™s ļ¬rm reacted when they were
informed of the breach to his law ļ¬rm? If you were a client, would
you continue to work with his ļ¬rm or would you be more likely to
ļ¬nd someone else? How many people would you tell about your
experience, further damaging the law ļ¬rmā€™s reputation?
As a client, you would not want to receive the following letter,
which was sent out by one Wealth Management company after
a breach in their security, ā€œWe are writing to inform you about
a recent incident that may have involved personal information
about you. We recently discovered that, between February 21
and March, 6, 2013 , a server containing information about you
was accessed by an unauthorized third party. We deeply regret
that this incident occurred and take very seriously the security of
personal information.ā€2
Not convinced of the potential damaged to be done? Statistics
show that ā€œnearly 60 percent of small businesses will close within
six months of a cyber-attackā€. 3
The reason for the shutdowns is
more than the cleanup costs, which can vary between hundreds
of thousands to millions of dollars. Itā€™s the fact that many current
clients will walk away and potential clients will ļ¬nd someone else
more ā€œtrustworthyā€ to deal with.
The Silver Lining
Now that you know just how vulnerable you might be to a
security attack, you might be wondering how you can possibly
prevent those attacks. If anti-virus and ļ¬rewall software is not
enough, what can protect you?
ā€œIt takes 20 years to
build a reputation and only
If you think about that, youā€™ll
do things differently.
ā€
www.pangeafamilyoffices.com Page 3 of 5
29
Although there is no foolproof process or technology that will
prevent a determined cyber-criminal from breaking in, most
cyber-breaches are actually preventable. They are the result of
someone on the inside ā€“ yourself, a staff member, or someone
working for a company you hired ā€“ clicking a link, opening an
attachment, installing some software, or otherwise doing some-
thing that rolls out the red carpet to invite the cyber-criminal
in, completely bypassing any security you may have in place to
protect your information. However, with some awareness training,
changes in behavior, and implementation of secure technology,
you can reduce the risk of a cyber-attack and, therefore, protect
your reputation, privacy, family, business, and ļ¬nances.
The ABTs of Cyber Safety for High
Net Worth Families
Imagine that you are driving on a particularly cold day, and all
the roads are icy. Would it be safe to take corners at 100 km/hr?
No, because you are aware that you will likely end up in the ditch
or perhaps worse. Therefore, you adjust your behavior to drive
much slower. Certainly, you can equip your car with better tires
and brakes, but it is unlikely that the technology will prevent you
from crashing your car if you also donā€™t adjust your behaviour to
match the conditions.
The same goes for cyber-security. If you understand your
environment, including what technology can and canā€™t do for
you and how your behaviour impacts your environment, you
will adjust your behaviour and your technology choices
accordingly.
As such, it is my conviction that both the strongest and the
weakest link in any type of security is us, humans. We can often
make mistakes, but given enough information, we will make
the ā€œrightā€ decision the majority of the time. For that reason,
educating you as my client is a core component of how I take
care of you. I do it through what I call the ā€œABTs of Cyber Safetyā€.
Awareness
The ļ¬rst step to cyber-safety is awareness training that covers all
the relevant areas for your family. Here, it is important to review
the possible consequences of typical risky behaviours such as
using easy-to-guess password, ignoring PC and smartphone
software updates, or not encrypting sensitive information in
to raise the likelihood of you adopting new, safer ones.
Once you understand why it is important to use different pass-
words for different accounts and devices, be it smartphones or
other systems, you are more likely to do it. The same goes for
understanding why it is important to be cautious when clicking
on links, opening attachments, and installing apps on your
smartphones or computers. Once you know that the link
advertising a new weight-loss technique could be the potential
downfall of all that you worked to achieve in your business and
family, you will think twice before clicking.
Social media is becoming an important way in which many
families communicate and express themselves. However, posting
pictures of your children, sharing when you are away from home
for holidays or business trips, or listing personal information
like birthdates can all be used against you by cyber-criminals.
Understanding these risks and being more cautious about what
information you share about yourself and your family can reduce
your exposure to a cyber-attack.
Behavior
Once everyone is on the same page as far as understanding the
cyber-risks to your family, I help you begin to implement what
was learnt in the awareness section.
The new behaviours may include:
ā€¢ using unique passwords for websites and systems
ā€¢ adding passwords where there were none,
e.g, on smartphones
ā€¢ deleting emails and links that come from unknown sources
ā€¢ appropriately researching apps before installing them
ā€¢ removing and not posting any personal or private information
about you and your family on social media
As this relates to the previous metaphor, this is where we begin
to slow down and drive much more safely. If you anticipate the
curves in the road ahead, you would avoid being thrown off
when one comes.
Technology
Buying and implementing technology has often been the gut
reaction for most people to solve a problem. The challenge is
that we become reliant on the technology to keep us safe.
We then engage in risky online behavior and falsely believe
our security software will keep us safe.
Unfortunately, this is far from the truth as the number of cyber
breaches and their victims continues to grow at an astronomical
level. Just like having better tires and brakes would not save
you from a sure accident on an icy road if you are making a
sharp turn travelling at 100 km/hr, having tech gadgets will
not save you from a cyber-attack if you are engaging in online
risky behaviour.
Instead, security technology should be just another layer in the
ā€œonionā€ of cyber-protection. However, before going out and
purchasing the latest security software that is touted to be the
ultimate protection against cyber-security, I recommend reviewing
your existing systems. It goes for both security (e.g., anti-virus,
ļ¬rewalls, etc.) and non-security (e.g., desktops, smartphones, etc.)
systems. When it comes to social media, adjusting your privacy
settings to limit who can access the information that you do post
and ensuring that you use some of the enhanced security fea-
tures will help prevent hackers from easily taking over your social
media accounts.
By taking these simple steps to improve the security of those
simple systems, you can reduce the cyber-security risk in some
cases by as much as 80% within days, if not hours.
www.pangeafamilyoffices.com Page 4 of 5
www.pangeafamilyoffices.com Page 5 of 5
30
6 Practical Steps to Protect your Business from
Cyber-criminals
I strongly believe that implementing simple and easy cyber-
security protection mechanisms are the best way in which
small businesses can protect themselves. It ensures a greater
level of success over solutions that are too complex or difļ¬cult
to implement. For this reason, I advocate easy-to-learn and
simple-to-implement solutions that allow my clients to gradually
ease into taking cyber-security measures, one step at a time.
1. Strategy
Step one is always building a strategy. It involves having an
understanding of what major cyber-risks face your business and
planning simple and easy strategies to remediate those issues.
2. Awareness Training
This is the most critical step businesses can take in protecting
themselves from the cyber-security threat. This training would
include assisting you in learning techniques that will help you
protect yourself from the common attacks that cyber-criminals
are using via smartphones, email, internet, social media, etc.
This includes the creation of a simple cyber acceptable use and
awareness policy that every member of the business reads, gets
training on, and signs to ensure understanding and compliance.
3. Critical Asset Classiļ¬cation and Protection
This phase concentrates on developing an understanding of
what your critical assets are (e.g., client databases, conļ¬dential
documents, ļ¬nancial information, intellectual property, emails,
passwords, etc.), where they are located, and what the conse-
quences would be if they were to fall into the hands of criminals
or otherwise unauthorized individuals. Because not all assets
have equal value, we develop a strategy on how to protect the
various types of assets. This may include stronger passwords,
encryption, relocating the assets to a more secure location, etc.,
depending on the asset.
However, non-technical controls are often overlooked and need
to be reviewed as well. It is important to know who has physical
and virtual (network) access to critical assets. For example, your
IT team may need to have access to your conļ¬dential documents
to back up your critical data, but the members of the IT team
should not be able to read those conļ¬dential documents.
4. Review of the Existing Security Software and Network
Appliances
Unfortunately, there are many assumptions when it comes
to security software, e.g., anti-virus, ļ¬rewalls, etc. and network
appliances such as wireless routers, switches, printers, etc.
Below are examples of such assumptions:
ā€¢ The security software is enabled on all systems
ā€¢ The default conļ¬gurations will protect you
ā€¢ The security software and network appliances are up-to-date
I am often surprised to see how many businesses hold the above
assumptions and leave glaring holes in their security that would
take a few minutes to review and a few clicks to rectify.
5. User-Level Access
By default, almost all systems grant administrative access to
users. That means that anyone can install software, including
a virus, or remove security protections such as an anti-virus
program. This poses a serious risk to businesses.
By simply having separate log-ins for everyday use and for
administrative purposes, you can protect yourself from as much
as 95% of most viruses, Trojans, and other malware.
6. Removing High Risk Software
There are many examples of high risk software that often come
installed by default or end up being installed on our systems.
Many of these types of software riddled with holes. As I write
this article, software vulnerabilities in Java, Flash, and Adobe
Reader are the top three targets that cyber-criminals use to attack
their victims. They represent 66% of all Microsoft windows and
many Mac OS X software vulnerabilities.4
By simply removing
these programs from the systems that do not require them,
you remove a massive cyber-risk to your business.
The Verdict
The cyber-threat is continuously evolving. Cyber-criminals are
using smartphones, social media, and the Internet to monitor,
stock, and perform recon before launching an attack on their
victims with precision. Attacks include identify theft, ļ¬nancial
fraud, ransom, information theft for proļ¬t, and preparation for
physical attacks like burglary. Partnering with a Reputation and
Security Strategist will allow you to implement proactive solutions
to assist you in protecting yourself, your family, and your business
from a constantly changing cyber-threat landscape.
1
2013 Norton Report (http://www.symantec.com/content/en/us/about/
presskits/b-norton-report-2013.en_ca.pdf)
2
State of California Department of Justice ā€“ Ofļ¬ce of the Attorney General
(http://oag.ca.gov/ecrime/databreach/reports/sb24-41702)
3
House Committee on Small Business (http://smallbusiness.house.gov/
news/documentsingle.aspx?DocumentID=325034)
4
http://www.tripwire.com/state-of-security/top-security-stories/
surprised-majority-systems-infected-via-adobe-java-exploits/
About the Author
Anwarā€™s experience spans over 20 years in Information Technology
with over 9 years in cyber security management and protection.
He has led security teams responsible for protecting multi-billion
dollar global ļ¬nancial companies from cyber attacks. Anwar has
been a keynote speaker at numerous events including the recent
Rogers Group Financial wealth management event in Vancouver.
He has also been featured in Business In Vancouver and
News Radio 1130AM.
Anwar tailors simple-to-understand and easy-to-implement
strategies that allow his clients to protect themselves from
the latest cyber threats.
Software vulnerabilities in Java, Flash, and
Adobe Reader are the top three targets that
cyber-criminals use to attack their victims
31Spring 2014 31Spring 2014
Contents Copyright Ā© 2015 by PANGEA Private Family Ofļ¬ces Inc.; may not be reprinted without written permission. PANGEA Private Family Ofļ¬ces Inc.
is a part of the PANGEA Global Wealth Group corporation. PANGEA Global Wealth Group is a Canadian controlled private corporation.
The information in this PANGEA Private Family Ofļ¬ces Special Report is for informational purposes only and is not intended to provide speciļ¬c ļ¬nancial,
investment, tax, legal, accounting or other advice to you, and should not be acted or relied upon in that regard without seeking the advice of a professional.
Your advisor can help to ensure that your own circumstances have been properly considered and any action is taken on the latest available information.
PANGEA Private Family Ofļ¬ces does not make any express or implied warranties, representations, or endorsements with respect to the information, processes,
products or advertisements included in this publication. PANGEA Private Family Ofļ¬ces is foremost a private, family wealth strategy ļ¬rm serving ļ¬rst and second
generation creators of signiļ¬cant wealth, and their children, with independent thinking that redeļ¬nes their family wealth experience. We specialize in resolving
complex family wealth issues for global families with thoughtful guidance and insider perspective. Our purpose is to help global families ļ¬‚ourish for generations.
Website: www.pangeafamilyofļ¬ces.com LinkedIn: PANGEA Private Family Ofļ¬ces Twitter: @PANGEAPrivateFO
Helping global families flourish for generations.

More Related Content

What's hot

cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
Ā 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
Ā 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
Ā 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
Ā 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
Ā 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012The Texas Network, LLC
Ā 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
Ā 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
Ā 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
Ā 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Browne Jacobson LLP
Ā 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceStatewide Insurance Brokers
Ā 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021 Roen Branham
Ā 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
Ā 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
Ā 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
Ā 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
Ā 

What's hot (17)

cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
Ā 
TME0212-49
TME0212-49TME0212-49
TME0212-49
Ā 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Ā 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
Ā 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
Ā 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
Ā 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
Ā 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
Ā 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
Ā 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Ā 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
Ā 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Ā 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
Ā 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Ā 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
Ā 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
Ā 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
Ā 

Viewers also liked

Cuidadooooo
CuidadoooooCuidadooooo
Cuidadooooocoko1294
Ā 
Š±ŠøрŠ¶ŠµŠ²Ń‹Šµ стрŠ°Ń‚ŠµŠ³ŠøŠø чŠµŃ€ŠµŠæŠ±Š¾Ń€Ń‚
Š±ŠøрŠ¶ŠµŠ²Ń‹Šµ стрŠ°Ń‚ŠµŠ³ŠøŠø чŠµŃ€ŠµŠæŠ±Š¾Ń€Ń‚Š±ŠøрŠ¶ŠµŠ²Ń‹Šµ стрŠ°Ń‚ŠµŠ³ŠøŠø чŠµŃ€ŠµŠæŠ±Š¾Ń€Ń‚
Š±ŠøрŠ¶ŠµŠ²Ń‹Šµ стрŠ°Ń‚ŠµŠ³ŠøŠø чŠµŃ€ŠµŠæŠ±Š¾Ń€Ń‚Nataly Cherepennikova
Ā 
Căn hį»™ Carillon 3 chungcucarillon.com.vn
Căn hį»™ Carillon 3 chungcucarillon.com.vnCăn hį»™ Carillon 3 chungcucarillon.com.vn
Căn hį»™ Carillon 3 chungcucarillon.com.vnCăn hį»™ Carillon 5
Ā 
lenguajes de programaciĆ³n
lenguajes de programaciĆ³n lenguajes de programaciĆ³n
lenguajes de programaciĆ³n lizethmtz01
Ā 
Sintex electrical applications
Sintex electrical applicationsSintex electrical applications
Sintex electrical applicationssaienterprusespune
Ā 
Cuentame 2013 palillos
Cuentame 2013 palillosCuentame 2013 palillos
Cuentame 2013 palillosJorge La Chira
Ā 
Akib mahmud-Crash Course Session 01
Akib mahmud-Crash Course Session 01Akib mahmud-Crash Course Session 01
Akib mahmud-Crash Course Session 01Crash Course
Ā 
Azmain adil-Crash Course Session 01
Azmain adil-Crash Course Session 01Azmain adil-Crash Course Session 01
Azmain adil-Crash Course Session 01Crash Course
Ā 
Anindita tasneem-Crash Course Session 01
Anindita tasneem-Crash Course Session 01Anindita tasneem-Crash Course Session 01
Anindita tasneem-Crash Course Session 01Crash Course
Ā 
ŠŸŠµŃ€ŠøŠ¾Š“ŠøчŠµŃŠŗŠ°Ń тŠ°Š±Š»ŠøцŠ° Š“Š²ŃƒŃŠ·Ń‹Ń‡Š½Ń‹Ń… "цŠøфрŠ¾Š²Ń‹Ń…" рŠµŠ±ŃƒŃŠ¾Š²
ŠŸŠµŃ€ŠøŠ¾Š“ŠøчŠµŃŠŗŠ°Ń тŠ°Š±Š»ŠøцŠ° Š“Š²ŃƒŃŠ·Ń‹Ń‡Š½Ń‹Ń… "цŠøфрŠ¾Š²Ń‹Ń…" рŠµŠ±ŃƒŃŠ¾Š²ŠŸŠµŃ€ŠøŠ¾Š“ŠøчŠµŃŠŗŠ°Ń тŠ°Š±Š»ŠøцŠ° Š“Š²ŃƒŃŠ·Ń‹Ń‡Š½Ń‹Ń… "цŠøфрŠ¾Š²Ń‹Ń…" рŠµŠ±ŃƒŃŠ¾Š²
ŠŸŠµŃ€ŠøŠ¾Š“ŠøчŠµŃŠŗŠ°Ń тŠ°Š±Š»ŠøцŠ° Š“Š²ŃƒŃŠ·Ń‹Ń‡Š½Ń‹Ń… "цŠøфрŠ¾Š²Ń‹Ń…" рŠµŠ±ŃƒŃŠ¾Š²ŠŠ½Š°Ń‚Š¾Š»ŠøŠ¹ ŠœŃŃ‡ŠµŠ²
Ā 
ISER Membership
ISER MembershipISER Membership
ISER Membershipsfams_comm
Ā 
Kazi tanvir-Crash Course Session 01
Kazi tanvir-Crash Course Session 01Kazi tanvir-Crash Course Session 01
Kazi tanvir-Crash Course Session 01Crash Course
Ā 
Optimising the impact of social innovation
Optimising the impact of social innovation Optimising the impact of social innovation
Optimising the impact of social innovation Anne-Marie Elias
Ā 
Altaf hossain razu-Crash Course Session 01
Altaf hossain razu-Crash Course Session 01Altaf hossain razu-Crash Course Session 01
Altaf hossain razu-Crash Course Session 01Crash Course
Ā 
Backbone using Extensible Database APIs over HTTP
Backbone using Extensible Database APIs over HTTPBackbone using Extensible Database APIs over HTTP
Backbone using Extensible Database APIs over HTTPMax Neunhƶffer
Ā 

Viewers also liked (20)

Cuidadooooo
CuidadoooooCuidadooooo
Cuidadooooo
Ā 
Š±ŠøрŠ¶ŠµŠ²Ń‹Šµ стрŠ°Ń‚ŠµŠ³ŠøŠø чŠµŃ€ŠµŠæŠ±Š¾Ń€Ń‚
Š±ŠøрŠ¶ŠµŠ²Ń‹Šµ стрŠ°Ń‚ŠµŠ³ŠøŠø чŠµŃ€ŠµŠæŠ±Š¾Ń€Ń‚Š±ŠøрŠ¶ŠµŠ²Ń‹Šµ стрŠ°Ń‚ŠµŠ³ŠøŠø чŠµŃ€ŠµŠæŠ±Š¾Ń€Ń‚
Š±ŠøрŠ¶ŠµŠ²Ń‹Šµ стрŠ°Ń‚ŠµŠ³ŠøŠø чŠµŃ€ŠµŠæŠ±Š¾Ń€Ń‚
Ā 
PISCINA 2014
PISCINA 2014PISCINA 2014
PISCINA 2014
Ā 
Căn hį»™ Carillon 3 chungcucarillon.com.vn
Căn hį»™ Carillon 3 chungcucarillon.com.vnCăn hį»™ Carillon 3 chungcucarillon.com.vn
Căn hį»™ Carillon 3 chungcucarillon.com.vn
Ā 
lenguajes de programaciĆ³n
lenguajes de programaciĆ³n lenguajes de programaciĆ³n
lenguajes de programaciĆ³n
Ā 
Visionario 1
Visionario 1Visionario 1
Visionario 1
Ā 
Sintex electrical applications
Sintex electrical applicationsSintex electrical applications
Sintex electrical applications
Ā 
Cuentame 2013 palillos
Cuentame 2013 palillosCuentame 2013 palillos
Cuentame 2013 palillos
Ā 
Akib mahmud-Crash Course Session 01
Akib mahmud-Crash Course Session 01Akib mahmud-Crash Course Session 01
Akib mahmud-Crash Course Session 01
Ā 
Azmain adil-Crash Course Session 01
Azmain adil-Crash Course Session 01Azmain adil-Crash Course Session 01
Azmain adil-Crash Course Session 01
Ā 
Phonemic Awareness Instruction
Phonemic Awareness InstructionPhonemic Awareness Instruction
Phonemic Awareness Instruction
Ā 
Anindita tasneem-Crash Course Session 01
Anindita tasneem-Crash Course Session 01Anindita tasneem-Crash Course Session 01
Anindita tasneem-Crash Course Session 01
Ā 
ŠŸŠµŃ€ŠøŠ¾Š“ŠøчŠµŃŠŗŠ°Ń тŠ°Š±Š»ŠøцŠ° Š“Š²ŃƒŃŠ·Ń‹Ń‡Š½Ń‹Ń… "цŠøфрŠ¾Š²Ń‹Ń…" рŠµŠ±ŃƒŃŠ¾Š²
ŠŸŠµŃ€ŠøŠ¾Š“ŠøчŠµŃŠŗŠ°Ń тŠ°Š±Š»ŠøцŠ° Š“Š²ŃƒŃŠ·Ń‹Ń‡Š½Ń‹Ń… "цŠøфрŠ¾Š²Ń‹Ń…" рŠµŠ±ŃƒŃŠ¾Š²ŠŸŠµŃ€ŠøŠ¾Š“ŠøчŠµŃŠŗŠ°Ń тŠ°Š±Š»ŠøцŠ° Š“Š²ŃƒŃŠ·Ń‹Ń‡Š½Ń‹Ń… "цŠøфрŠ¾Š²Ń‹Ń…" рŠµŠ±ŃƒŃŠ¾Š²
ŠŸŠµŃ€ŠøŠ¾Š“ŠøчŠµŃŠŗŠ°Ń тŠ°Š±Š»ŠøцŠ° Š“Š²ŃƒŃŠ·Ń‹Ń‡Š½Ń‹Ń… "цŠøфрŠ¾Š²Ń‹Ń…" рŠµŠ±ŃƒŃŠ¾Š²
Ā 
ISER Membership
ISER MembershipISER Membership
ISER Membership
Ā 
Prezentacja 3.0
Prezentacja 3.0Prezentacja 3.0
Prezentacja 3.0
Ā 
Kazi tanvir-Crash Course Session 01
Kazi tanvir-Crash Course Session 01Kazi tanvir-Crash Course Session 01
Kazi tanvir-Crash Course Session 01
Ā 
Optimising the impact of social innovation
Optimising the impact of social innovation Optimising the impact of social innovation
Optimising the impact of social innovation
Ā 
Altaf hossain razu-Crash Course Session 01
Altaf hossain razu-Crash Course Session 01Altaf hossain razu-Crash Course Session 01
Altaf hossain razu-Crash Course Session 01
Ā 
ĪŸĪ¼Ī¬Ī“Ī± Ī•ĪøĪµĪ»ĪæĪ½Ļ„ĻŽĪ½ Ī¦ĻŽĻ„Īæ
ĪŸĪ¼Ī¬Ī“Ī± Ī•ĪøĪµĪ»ĪæĪ½Ļ„ĻŽĪ½ Ī¦ĻŽĻ„ĪæĪŸĪ¼Ī¬Ī“Ī± Ī•ĪøĪµĪ»ĪæĪ½Ļ„ĻŽĪ½ Ī¦ĻŽĻ„Īæ
ĪŸĪ¼Ī¬Ī“Ī± Ī•ĪøĪµĪ»ĪæĪ½Ļ„ĻŽĪ½ Ī¦ĻŽĻ„Īæ
Ā 
Backbone using Extensible Database APIs over HTTP
Backbone using Extensible Database APIs over HTTPBackbone using Extensible Database APIs over HTTP
Backbone using Extensible Database APIs over HTTP
Ā 

Similar to Helping families protect against cyber threats

11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
Ā 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for DummiesLiberteks
Ā 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
Ā 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesD-Amies Technologies (P) Ltd.
Ā 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
Ā 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
Ā 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
Ā 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
Ā 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
Ā 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overviewbpeacher
Ā 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
Ā 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
Ā 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
Ā 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium PartnersDAVID BERGH
Ā 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
Ā 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
Ā 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Identity Advocate
Ā 
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfHow to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
Ā 

Similar to Helping families protect against cyber threats (20)

11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Ā 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
Ā 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for Dummies
Ā 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
Ā 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small Businesses
Ā 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
Ā 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
Ā 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
Ā 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
Ā 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
Ā 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
Ā 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
Ā 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
Ā 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Ā 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium Partners
Ā 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
Ā 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
Ā 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
Ā 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
Ā 
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdfHow to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
How to Stop Synthetic Fraud - Bahaa Abdul Hadi.pdf
Ā 

More from Declan Winston Ramsaran

PANGEA Private Capital Markets Resource (1).pdf
PANGEA Private Capital Markets Resource (1).pdfPANGEA Private Capital Markets Resource (1).pdf
PANGEA Private Capital Markets Resource (1).pdfDeclan Winston Ramsaran
Ā 
CRYPTO for your THOUGHTS? Is a new asset class emerging?
CRYPTO for your THOUGHTS? Is a new asset class emerging? CRYPTO for your THOUGHTS? Is a new asset class emerging?
CRYPTO for your THOUGHTS? Is a new asset class emerging? Declan Winston Ramsaran
Ā 
PANGEA Talks Investing in Psychedelics w/ Portfolio Manager, Rawn Lakhan
PANGEA Talks Investing in Psychedelics w/ Portfolio Manager, Rawn LakhanPANGEA Talks Investing in Psychedelics w/ Portfolio Manager, Rawn Lakhan
PANGEA Talks Investing in Psychedelics w/ Portfolio Manager, Rawn LakhanDeclan Winston Ramsaran
Ā 
PANGEA Private Wealth Group 2016 Q2 Quarterly
PANGEA Private Wealth Group 2016 Q2 QuarterlyPANGEA Private Wealth Group 2016 Q2 Quarterly
PANGEA Private Wealth Group 2016 Q2 QuarterlyDeclan Winston Ramsaran
Ā 
PANGEA Private Family Offices Quarterly 2016 Q1
PANGEA Private Family Offices Quarterly 2016 Q1PANGEA Private Family Offices Quarterly 2016 Q1
PANGEA Private Family Offices Quarterly 2016 Q1Declan Winston Ramsaran
Ā 
Renewable Energy Investment article March, 2016
 Renewable Energy Investment article March, 2016 Renewable Energy Investment article March, 2016
Renewable Energy Investment article March, 2016Declan Winston Ramsaran
Ā 
Wealth Management in Multigenerational Families an interview by Dr. Kirby Ros...
Wealth Management in Multigenerational Families an interview by Dr. Kirby Ros...Wealth Management in Multigenerational Families an interview by Dr. Kirby Ros...
Wealth Management in Multigenerational Families an interview by Dr. Kirby Ros...Declan Winston Ramsaran
Ā 
Our 5 Core Beliefs - PANGEA Private Family Offices
Our 5 Core Beliefs - PANGEA Private Family OfficesOur 5 Core Beliefs - PANGEA Private Family Offices
Our 5 Core Beliefs - PANGEA Private Family OfficesDeclan Winston Ramsaran
Ā 
PANGEA Private Family Offices - The Silent Paradigm Shift in Family Wealth St...
PANGEA Private Family Offices - The Silent Paradigm Shift in Family Wealth St...PANGEA Private Family Offices - The Silent Paradigm Shift in Family Wealth St...
PANGEA Private Family Offices - The Silent Paradigm Shift in Family Wealth St...Declan Winston Ramsaran
Ā 
PANGEA Private Family Offices - Family Wealth Journal, Spring 2014
PANGEA Private Family Offices - Family Wealth Journal, Spring 2014PANGEA Private Family Offices - Family Wealth Journal, Spring 2014
PANGEA Private Family Offices - Family Wealth Journal, Spring 2014Declan Winston Ramsaran
Ā 

More from Declan Winston Ramsaran (10)

PANGEA Private Capital Markets Resource (1).pdf
PANGEA Private Capital Markets Resource (1).pdfPANGEA Private Capital Markets Resource (1).pdf
PANGEA Private Capital Markets Resource (1).pdf
Ā 
CRYPTO for your THOUGHTS? Is a new asset class emerging?
CRYPTO for your THOUGHTS? Is a new asset class emerging? CRYPTO for your THOUGHTS? Is a new asset class emerging?
CRYPTO for your THOUGHTS? Is a new asset class emerging?
Ā 
PANGEA Talks Investing in Psychedelics w/ Portfolio Manager, Rawn Lakhan
PANGEA Talks Investing in Psychedelics w/ Portfolio Manager, Rawn LakhanPANGEA Talks Investing in Psychedelics w/ Portfolio Manager, Rawn Lakhan
PANGEA Talks Investing in Psychedelics w/ Portfolio Manager, Rawn Lakhan
Ā 
PANGEA Private Wealth Group 2016 Q2 Quarterly
PANGEA Private Wealth Group 2016 Q2 QuarterlyPANGEA Private Wealth Group 2016 Q2 Quarterly
PANGEA Private Wealth Group 2016 Q2 Quarterly
Ā 
PANGEA Private Family Offices Quarterly 2016 Q1
PANGEA Private Family Offices Quarterly 2016 Q1PANGEA Private Family Offices Quarterly 2016 Q1
PANGEA Private Family Offices Quarterly 2016 Q1
Ā 
Renewable Energy Investment article March, 2016
 Renewable Energy Investment article March, 2016 Renewable Energy Investment article March, 2016
Renewable Energy Investment article March, 2016
Ā 
Wealth Management in Multigenerational Families an interview by Dr. Kirby Ros...
Wealth Management in Multigenerational Families an interview by Dr. Kirby Ros...Wealth Management in Multigenerational Families an interview by Dr. Kirby Ros...
Wealth Management in Multigenerational Families an interview by Dr. Kirby Ros...
Ā 
Our 5 Core Beliefs - PANGEA Private Family Offices
Our 5 Core Beliefs - PANGEA Private Family OfficesOur 5 Core Beliefs - PANGEA Private Family Offices
Our 5 Core Beliefs - PANGEA Private Family Offices
Ā 
PANGEA Private Family Offices - The Silent Paradigm Shift in Family Wealth St...
PANGEA Private Family Offices - The Silent Paradigm Shift in Family Wealth St...PANGEA Private Family Offices - The Silent Paradigm Shift in Family Wealth St...
PANGEA Private Family Offices - The Silent Paradigm Shift in Family Wealth St...
Ā 
PANGEA Private Family Offices - Family Wealth Journal, Spring 2014
PANGEA Private Family Offices - Family Wealth Journal, Spring 2014PANGEA Private Family Offices - Family Wealth Journal, Spring 2014
PANGEA Private Family Offices - Family Wealth Journal, Spring 2014
Ā 

Recently uploaded

(8264348440) šŸ” Call Girls In Hauz Khas šŸ” Delhi NCR
(8264348440) šŸ” Call Girls In Hauz Khas šŸ” Delhi NCR(8264348440) šŸ” Call Girls In Hauz Khas šŸ” Delhi NCR
(8264348440) šŸ” Call Girls In Hauz Khas šŸ” Delhi NCRsoniya singh
Ā 
Call Girls In Kishangarh Delhi ā¤ļø8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ā¤ļø8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ā¤ļø8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ā¤ļø8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
Ā 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
Ā 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
Ā 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
Ā 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
Ā 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
Ā 
/:Call Girls In Indirapuram Ghaziabad āž„9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad āž„9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad āž„9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad āž„9990211544 Independent Best Escorts In...lizamodels9
Ā 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
Ā 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
Ā 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
Ā 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
Ā 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
Ā 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
Ā 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
Ā 
BEST Call Girls In Greater Noida āœØ 9773824855 āœØ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida āœØ 9773824855 āœØ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida āœØ 9773824855 āœØ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida āœØ 9773824855 āœØ Escorts Service In Delhi Ncr,noida100girls
Ā 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
Ā 
(8264348440) šŸ” Call Girls In Keshav Puram šŸ” Delhi NCR
(8264348440) šŸ” Call Girls In Keshav Puram šŸ” Delhi NCR(8264348440) šŸ” Call Girls In Keshav Puram šŸ” Delhi NCR
(8264348440) šŸ” Call Girls In Keshav Puram šŸ” Delhi NCRsoniya singh
Ā 
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdfCatalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdfOrient Homes
Ā 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...lizamodels9
Ā 

Recently uploaded (20)

(8264348440) šŸ” Call Girls In Hauz Khas šŸ” Delhi NCR
(8264348440) šŸ” Call Girls In Hauz Khas šŸ” Delhi NCR(8264348440) šŸ” Call Girls In Hauz Khas šŸ” Delhi NCR
(8264348440) šŸ” Call Girls In Hauz Khas šŸ” Delhi NCR
Ā 
Call Girls In Kishangarh Delhi ā¤ļø8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ā¤ļø8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ā¤ļø8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ā¤ļø8860477959 Good Looking Escorts In 24/7 Delh...
Ā 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Ā 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Ā 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
Ā 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
Ā 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
Ā 
/:Call Girls In Indirapuram Ghaziabad āž„9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad āž„9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad āž„9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad āž„9990211544 Independent Best Escorts In...
Ā 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
Ā 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
Ā 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Ā 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Ā 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
Ā 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
Ā 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
Ā 
BEST Call Girls In Greater Noida āœØ 9773824855 āœØ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida āœØ 9773824855 āœØ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida āœØ 9773824855 āœØ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida āœØ 9773824855 āœØ Escorts Service In Delhi Ncr,
Ā 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
Ā 
(8264348440) šŸ” Call Girls In Keshav Puram šŸ” Delhi NCR
(8264348440) šŸ” Call Girls In Keshav Puram šŸ” Delhi NCR(8264348440) šŸ” Call Girls In Keshav Puram šŸ” Delhi NCR
(8264348440) šŸ” Call Girls In Keshav Puram šŸ” Delhi NCR
Ā 
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdfCatalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NĘÆį»šC uPVC - HDPE DE NHAT.pdf
Ā 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ā¤ļø8860477959 Escorts...
Ā 

Helping families protect against cyber threats

  • 1. 1 Summer 2014 Special Report Helping global families flourish for generations. A Special Report for Clients of PANGEA Private Family Offices with Anwar Visram, CEO of Visram Security. How cyber-secure is your family enterprise? For private client use only
  • 2. ā€œ information being leaked from an unknown source. After many weeks of investigation, it was determined that the source of the leak was none other than Steveā€™s own laptop. ā€
  • 3. Who are the Targets? Private wealth management, Family Ofļ¬ces, accounting and many other ļ¬rms that have access to private and conļ¬dential information of the high net worth clients are increasingly being targeted. These businesses may be small in terms of the number of employees they have, but their clients have billions of dollars in assets, making them a large target. Small businesses and high net worth families are particularly prone to these types of attacks. In case you are wondering, I group high net worth families with small businesses because many of these families operate like a small business as they have many people directly involved in their lives, from lawyers and image consultants to assistants and cleaning staff. Your family may not be a business per se, but you are still vulnerable. Why are small businesses and high net worth families particularly prone to cyber-attacks? Because very few businesses and families have worked with a Reputation and Security Strategist that would assist them in understanding all the risks they may be exposed to. Not knowing the risks, most small businesses and families use the very basic cyber- security protection, e.g., anti-virus or ļ¬rewalls. They rarely have awareness training on the doā€™s and donā€™ts of cyber-safety. They employ weak password protection mechanisms and expose sensitive data without even knowing it. These are just a few examples of common cyber-protection behaviours that people think are sufļ¬cient to prevent cyber-attacks. In truth, small businesses are often unprepared for cyber-attacks because they donā€™t put the resources into protecting themselves. Who are the Perpetrators? As the types of cyber-threats evolve and become more sophisticated, so do the types of cyber-criminals or ā€œactorsā€. Among many actors in the cyber-crime space, the main four are: 1. Petty Criminal ā€“ Generally not well-funded or organized. They just want to get in and out so they can sell what they stole for money. 2. Hackavist/Cyber-Terrorist ā€“ Not well-funded but well- organized. They set up political campaigns and target speciļ¬c companies, organizations, or governments. A well-known e xample of such an actor is the hacker group Anonymous, who targeted ļ¬nancial companies because the group believed the companies were responsible for the 2008 ļ¬nancial crisis. 3. Organized Crime ā€“ Well-organized and well-funded. They use a variety of malware such as viruses, Trojans, ransomware and botnets. These programs can inļ¬ltrate your computer, corrupt it, and leave it vulnerable to future attacks. Financial gain is the purpose of such attacks. 4. State-Sponsored Attackers ā€“ Elite hackers and hacker groups hired by governments to steal state secrets and other sensitive information or inļ¬‚ict damage on the internal systems. They may also perform corporate espionage, or steal conļ¬dential information and intellectual property to assist ā€œfriendlyā€ companies. You may remember the highly publicized ā€œStuxnetā€ attack against Iranā€™s nuclear facility an example. ANWAR VISRAM A Leading Canadian Reputation & Security Strategist, Anwar is CEO of Visram Security. He specializes in assisting high net worth families & private wealth management ļ¬rms to protect themselves from the rapidly growing cyber threat. Questions for Anwar can be e-mailed to: thought.leadership@pangeafamilyofļ¬ces.com How cyber-secure is your family enterprise? Even wealth services providers are concerned about cyber-attacks to access private client information. You may think to yourself that this was just an isolated incident and that this would never happen to you. Unfortunately, that is precisely what Steve believed before this happened to Steve and his law ļ¬rm. If this little anecdote didnā€™t raise an internal alarm in you, consider the following statistics. Cyber-attacks in Numbers Last year was an epic year for global data breaches as cyber- criminals were busy stealing private and conļ¬dential client information. It broke 2011ā€™s record for the number of pieces of information exposed by 200%. In Canada, it is estimated that there were seven million cyber -victims last year. If you exclude children under the age of fourteen that means one in four Canadians was a victim of a cyber-crime! Bear in mind, these numbers only represent cyber-attacks that have been reported. There are many more thousands of cyber- attacks that go unreported each year, very much like the one that involved Steveā€™s ļ¬rm. Unlike in the years gone by when cyber-criminals looked to make headlines, modern cyber-criminals prefer to work in ā€œstealthā€ mode. In fact, most cyber-breaches go unidentiļ¬ed for weeks, months, or even years. Undetected, cyber-thieves can cause great damage to their high net worth targets because they can exploit the same security weaknesses and continue stealing valuable information over and over again. | PANGEA Private Family Offices In 2013 alone, 822 million records were exposed in 2,154 separate incidents and the top three countries targeted by cyber-criminals were the US, United Kingdom, and Canada.1 www.pangeagamilyoffices.com Page 2 of 5 TM
  • 4. When the Marvels of Tecnology Backļ¬re Not only do we now have a variety of cyber-perpetrators, but we also have a greater number of ways in which security can be breached and your information can be stolen. Do you, or someone you know, use a security company to monitor the security of your home? You would probably never think that such a service may present a cyber-security risk for you, but you might change your mind after reading the following story. I was speaking with an owner of a company that specializes in environmental controls, home entertainment, and physical security systems for the homes of high net worth clients. The system that he was installing into these homes controls all the features of the home: inside temperature, lighting, audio/video media units, cameras, and electronic doors- luxury to be sure, but one that could prove fatal. The homeowners could access the system in three different ways: from a single control panel within the home, over the Internet using an Internet browser, or through a smartphone app. Although the ease of access and the variety of options to control the system delighted the customers of this home security company, they had no idea what a terrible cyber-risk they were exposed to! Because the monitoring station is connected to all the clients of this company, a breach at the monitoring station would result in direct access to all of those clients. Criminals could monitor their intended victim via the cameras for weeks, or even months, undetected. At the opportune moment, they could disable the alarm and open the doors for a perfect break-in, all via the Internet. I asked the owner of the company some basic questions, such as what was in place to protect the customers from a cyber-at- tack against the control system or if there was a way the system would be able to monitor and alert the company if the security system was breached? Unfortunately, he did not have a deļ¬nite response to these questions and many more. In fact, I donā€™t believe he had even considered some of the risks we discussed. The challenge of the modern day is that we have fantastic technology that allows us to do amazing things, but it also leaves us vulnerable, particularly in areas we least expect it. Many companies are embracing newer and newer technology to innovate their products, yet they arenā€™t aware of the potential negative consequences of doing so. In order to weigh the consequences of remaining in the dark, I ask you to consider the real cost of security breaches. The Real Costs of Security Breaches One common misconception is that the security breach in and of itself is the main problem. However, though the breach itself is terrible, the real devastation occurs during the fallout, the time after the breach has been discovered and when steps are being taken to recover. This recovery process is often a long road to walk and not all come out on top. One of the primary impacts will be to the victimā€™s reputation. As Warren Buffet correctly suggests, ā€œIt takes 20 years to build a reputation and only ļ¬ve minutes to ruin it. If you think about that, youā€™ll do things differently.ā€ In addition, cyber-crime goes beyond the irreparable damage to your family or a business reputation. It often includes exposure of sensitive information, intellectual property loss, cyber-espionage, identity theft, as well as losses that impact third parties like friends, family, clients and customers. You arenā€™t only putting yourself at risk-you endanger those close to you, too. Imagine for a moment your family was a victim of identity theft. It would take criminals minutes to obtain your credit card information and begin misusing your identity for their proļ¬t. Before you ļ¬nish drinking a cup of your morning coffee, they could destroy your credit rating that took you decades to establish. How do you think clients of Steveā€™s ļ¬rm reacted when they were informed of the breach to his law ļ¬rm? If you were a client, would you continue to work with his ļ¬rm or would you be more likely to ļ¬nd someone else? How many people would you tell about your experience, further damaging the law ļ¬rmā€™s reputation? As a client, you would not want to receive the following letter, which was sent out by one Wealth Management company after a breach in their security, ā€œWe are writing to inform you about a recent incident that may have involved personal information about you. We recently discovered that, between February 21 and March, 6, 2013 , a server containing information about you was accessed by an unauthorized third party. We deeply regret that this incident occurred and take very seriously the security of personal information.ā€2 Not convinced of the potential damaged to be done? Statistics show that ā€œnearly 60 percent of small businesses will close within six months of a cyber-attackā€. 3 The reason for the shutdowns is more than the cleanup costs, which can vary between hundreds of thousands to millions of dollars. Itā€™s the fact that many current clients will walk away and potential clients will ļ¬nd someone else more ā€œtrustworthyā€ to deal with. The Silver Lining Now that you know just how vulnerable you might be to a security attack, you might be wondering how you can possibly prevent those attacks. If anti-virus and ļ¬rewall software is not enough, what can protect you? ā€œIt takes 20 years to build a reputation and only If you think about that, youā€™ll do things differently. ā€ www.pangeafamilyoffices.com Page 3 of 5
  • 5. 29 Although there is no foolproof process or technology that will prevent a determined cyber-criminal from breaking in, most cyber-breaches are actually preventable. They are the result of someone on the inside ā€“ yourself, a staff member, or someone working for a company you hired ā€“ clicking a link, opening an attachment, installing some software, or otherwise doing some- thing that rolls out the red carpet to invite the cyber-criminal in, completely bypassing any security you may have in place to protect your information. However, with some awareness training, changes in behavior, and implementation of secure technology, you can reduce the risk of a cyber-attack and, therefore, protect your reputation, privacy, family, business, and ļ¬nances. The ABTs of Cyber Safety for High Net Worth Families Imagine that you are driving on a particularly cold day, and all the roads are icy. Would it be safe to take corners at 100 km/hr? No, because you are aware that you will likely end up in the ditch or perhaps worse. Therefore, you adjust your behavior to drive much slower. Certainly, you can equip your car with better tires and brakes, but it is unlikely that the technology will prevent you from crashing your car if you also donā€™t adjust your behaviour to match the conditions. The same goes for cyber-security. If you understand your environment, including what technology can and canā€™t do for you and how your behaviour impacts your environment, you will adjust your behaviour and your technology choices accordingly. As such, it is my conviction that both the strongest and the weakest link in any type of security is us, humans. We can often make mistakes, but given enough information, we will make the ā€œrightā€ decision the majority of the time. For that reason, educating you as my client is a core component of how I take care of you. I do it through what I call the ā€œABTs of Cyber Safetyā€. Awareness The ļ¬rst step to cyber-safety is awareness training that covers all the relevant areas for your family. Here, it is important to review the possible consequences of typical risky behaviours such as using easy-to-guess password, ignoring PC and smartphone software updates, or not encrypting sensitive information in to raise the likelihood of you adopting new, safer ones. Once you understand why it is important to use different pass- words for different accounts and devices, be it smartphones or other systems, you are more likely to do it. The same goes for understanding why it is important to be cautious when clicking on links, opening attachments, and installing apps on your smartphones or computers. Once you know that the link advertising a new weight-loss technique could be the potential downfall of all that you worked to achieve in your business and family, you will think twice before clicking. Social media is becoming an important way in which many families communicate and express themselves. However, posting pictures of your children, sharing when you are away from home for holidays or business trips, or listing personal information like birthdates can all be used against you by cyber-criminals. Understanding these risks and being more cautious about what information you share about yourself and your family can reduce your exposure to a cyber-attack. Behavior Once everyone is on the same page as far as understanding the cyber-risks to your family, I help you begin to implement what was learnt in the awareness section. The new behaviours may include: ā€¢ using unique passwords for websites and systems ā€¢ adding passwords where there were none, e.g, on smartphones ā€¢ deleting emails and links that come from unknown sources ā€¢ appropriately researching apps before installing them ā€¢ removing and not posting any personal or private information about you and your family on social media As this relates to the previous metaphor, this is where we begin to slow down and drive much more safely. If you anticipate the curves in the road ahead, you would avoid being thrown off when one comes. Technology Buying and implementing technology has often been the gut reaction for most people to solve a problem. The challenge is that we become reliant on the technology to keep us safe. We then engage in risky online behavior and falsely believe our security software will keep us safe. Unfortunately, this is far from the truth as the number of cyber breaches and their victims continues to grow at an astronomical level. Just like having better tires and brakes would not save you from a sure accident on an icy road if you are making a sharp turn travelling at 100 km/hr, having tech gadgets will not save you from a cyber-attack if you are engaging in online risky behaviour. Instead, security technology should be just another layer in the ā€œonionā€ of cyber-protection. However, before going out and purchasing the latest security software that is touted to be the ultimate protection against cyber-security, I recommend reviewing your existing systems. It goes for both security (e.g., anti-virus, ļ¬rewalls, etc.) and non-security (e.g., desktops, smartphones, etc.) systems. When it comes to social media, adjusting your privacy settings to limit who can access the information that you do post and ensuring that you use some of the enhanced security fea- tures will help prevent hackers from easily taking over your social media accounts. By taking these simple steps to improve the security of those simple systems, you can reduce the cyber-security risk in some cases by as much as 80% within days, if not hours. www.pangeafamilyoffices.com Page 4 of 5
  • 6. www.pangeafamilyoffices.com Page 5 of 5 30 6 Practical Steps to Protect your Business from Cyber-criminals I strongly believe that implementing simple and easy cyber- security protection mechanisms are the best way in which small businesses can protect themselves. It ensures a greater level of success over solutions that are too complex or difļ¬cult to implement. For this reason, I advocate easy-to-learn and simple-to-implement solutions that allow my clients to gradually ease into taking cyber-security measures, one step at a time. 1. Strategy Step one is always building a strategy. It involves having an understanding of what major cyber-risks face your business and planning simple and easy strategies to remediate those issues. 2. Awareness Training This is the most critical step businesses can take in protecting themselves from the cyber-security threat. This training would include assisting you in learning techniques that will help you protect yourself from the common attacks that cyber-criminals are using via smartphones, email, internet, social media, etc. This includes the creation of a simple cyber acceptable use and awareness policy that every member of the business reads, gets training on, and signs to ensure understanding and compliance. 3. Critical Asset Classiļ¬cation and Protection This phase concentrates on developing an understanding of what your critical assets are (e.g., client databases, conļ¬dential documents, ļ¬nancial information, intellectual property, emails, passwords, etc.), where they are located, and what the conse- quences would be if they were to fall into the hands of criminals or otherwise unauthorized individuals. Because not all assets have equal value, we develop a strategy on how to protect the various types of assets. This may include stronger passwords, encryption, relocating the assets to a more secure location, etc., depending on the asset. However, non-technical controls are often overlooked and need to be reviewed as well. It is important to know who has physical and virtual (network) access to critical assets. For example, your IT team may need to have access to your conļ¬dential documents to back up your critical data, but the members of the IT team should not be able to read those conļ¬dential documents. 4. Review of the Existing Security Software and Network Appliances Unfortunately, there are many assumptions when it comes to security software, e.g., anti-virus, ļ¬rewalls, etc. and network appliances such as wireless routers, switches, printers, etc. Below are examples of such assumptions: ā€¢ The security software is enabled on all systems ā€¢ The default conļ¬gurations will protect you ā€¢ The security software and network appliances are up-to-date I am often surprised to see how many businesses hold the above assumptions and leave glaring holes in their security that would take a few minutes to review and a few clicks to rectify. 5. User-Level Access By default, almost all systems grant administrative access to users. That means that anyone can install software, including a virus, or remove security protections such as an anti-virus program. This poses a serious risk to businesses. By simply having separate log-ins for everyday use and for administrative purposes, you can protect yourself from as much as 95% of most viruses, Trojans, and other malware. 6. Removing High Risk Software There are many examples of high risk software that often come installed by default or end up being installed on our systems. Many of these types of software riddled with holes. As I write this article, software vulnerabilities in Java, Flash, and Adobe Reader are the top three targets that cyber-criminals use to attack their victims. They represent 66% of all Microsoft windows and many Mac OS X software vulnerabilities.4 By simply removing these programs from the systems that do not require them, you remove a massive cyber-risk to your business. The Verdict The cyber-threat is continuously evolving. Cyber-criminals are using smartphones, social media, and the Internet to monitor, stock, and perform recon before launching an attack on their victims with precision. Attacks include identify theft, ļ¬nancial fraud, ransom, information theft for proļ¬t, and preparation for physical attacks like burglary. Partnering with a Reputation and Security Strategist will allow you to implement proactive solutions to assist you in protecting yourself, your family, and your business from a constantly changing cyber-threat landscape. 1 2013 Norton Report (http://www.symantec.com/content/en/us/about/ presskits/b-norton-report-2013.en_ca.pdf) 2 State of California Department of Justice ā€“ Ofļ¬ce of the Attorney General (http://oag.ca.gov/ecrime/databreach/reports/sb24-41702) 3 House Committee on Small Business (http://smallbusiness.house.gov/ news/documentsingle.aspx?DocumentID=325034) 4 http://www.tripwire.com/state-of-security/top-security-stories/ surprised-majority-systems-infected-via-adobe-java-exploits/ About the Author Anwarā€™s experience spans over 20 years in Information Technology with over 9 years in cyber security management and protection. He has led security teams responsible for protecting multi-billion dollar global ļ¬nancial companies from cyber attacks. Anwar has been a keynote speaker at numerous events including the recent Rogers Group Financial wealth management event in Vancouver. He has also been featured in Business In Vancouver and News Radio 1130AM. Anwar tailors simple-to-understand and easy-to-implement strategies that allow his clients to protect themselves from the latest cyber threats. Software vulnerabilities in Java, Flash, and Adobe Reader are the top three targets that cyber-criminals use to attack their victims
  • 7. 31Spring 2014 31Spring 2014 Contents Copyright Ā© 2015 by PANGEA Private Family Ofļ¬ces Inc.; may not be reprinted without written permission. PANGEA Private Family Ofļ¬ces Inc. is a part of the PANGEA Global Wealth Group corporation. PANGEA Global Wealth Group is a Canadian controlled private corporation. The information in this PANGEA Private Family Ofļ¬ces Special Report is for informational purposes only and is not intended to provide speciļ¬c ļ¬nancial, investment, tax, legal, accounting or other advice to you, and should not be acted or relied upon in that regard without seeking the advice of a professional. Your advisor can help to ensure that your own circumstances have been properly considered and any action is taken on the latest available information. PANGEA Private Family Ofļ¬ces does not make any express or implied warranties, representations, or endorsements with respect to the information, processes, products or advertisements included in this publication. PANGEA Private Family Ofļ¬ces is foremost a private, family wealth strategy ļ¬rm serving ļ¬rst and second generation creators of signiļ¬cant wealth, and their children, with independent thinking that redeļ¬nes their family wealth experience. We specialize in resolving complex family wealth issues for global families with thoughtful guidance and insider perspective. Our purpose is to help global families ļ¬‚ourish for generations. Website: www.pangeafamilyofļ¬ces.com LinkedIn: PANGEA Private Family Ofļ¬ces Twitter: @PANGEAPrivateFO Helping global families flourish for generations.