SlideShare a Scribd company logo
Protecting Your
  Business
       from the
Single Greatest Threat
   of the 21st Century

                                     Presented by:
                                    Mack Jackson
                         MJ Computer Concepts Inc.
Identity Theft
    Is the fastest growing crime of the 21st
     century
    Something few people know about, and
     even fewer know what to do about it
    It directly affects you, your customers and
     your employees
    There are new federal, state and industry
     regulations that require you to take action
Knowledge is Power
    Protect your business – and keep out of
     legal trouble
    Gain the trust, loyalty of your customers
    Protect your employees
    Set yourself apart from your competitors
Digital Connected World


 •   Computers, Internet, smart phones

 •   Amazing technologies, opportunities

 •   Exciting age of information and
     communication
With the amazing
technology,
comes the bad people…

  The “Cyber Criminal”
  Crooks have adapted
  The new threats we face are devastating
  The unprepared and complacent are being
   victimized
The Crime:



Identity Theft and Fraud
         Personal
         Financial
         Medical
         Criminal
Identity Theft
and Fraud
    Confidential information is the new currency
     of thieves
    Sophisticated under ground market for
     stolen personal and financial information
    Old school theft
    Today’s Cyber Criminal
    Doctor’s Office
    Family Members
Why should you be concerned
    as a business owner
        or manager?
Businesses:
The main source of stolen
identities, cyber-crime and fraud in
America.
The Problem:
Exposure, Loss
or Theft of…
   Customer information
   Employee information
   Business information
   Financial information

      Photo Copiers
    NY Cyber Ring Bust
The Problem:
    Over 500 million customer/employee
     records lost or stolen since 2005 (Privacy Rights
     Clearinghouse)
    Up to 88% of lost or stolen records is due to
     employee negligence or fraud. (Ponemon
     Institute, 2009)
Small Businesses:
The Target
    85% of fraud occurs
     in small businesses.
     (VISA Security Summit,
     International Council for Small Business)

    $54 billion in damages to
     SMB’s in 2009 – up 12.5%
     (Javelin Research)

    Small business owners
     identity stolen 1.5 times
     more than others (Javelin Research)
How it Happens:

   Employees/Insiders
   Hackers/Criminals
How it Happens:


    Viruses, spyware, keyloggers
    Social engineering, phishing
    Computer hi-jacking
    “Dumpster-divers”
What’s at Stake?
Devastating consequences
   with a data breach!
Lost CUSTOMERS
       Lost trust and loyalty
       After a data breach:
          40% will consider ending the
          relationship
          20% will no longer do business
          with you
          5% are considering legal action
    (CIO Magazine)
Damaged IMAGE
   Your personal and
    business reputation is at
    stake
Stolen Money
   Global cyber-crime rings
    stealing money directly
    from business bank
    accounts
Recovery COSTS
   Disruption of business
   Financial damages
   Customer reparations
   Restore image
BUSINESSES now bear the
biggest liability and the greatest
 financial risk from identity theft
             and fraud
Major Federal Laws
      Red Flags Rule
      Applies to anyone who arranges for or extends credit
      or payment terms, or who provides products or
      services and bills or invoices the customer.

      GLBA (Gramm-Leach-Bliley Act)
      Applies to any business or organization that handles
      personal financial related information (such as banks,
      insurance/securities agencies, lenders, accountants & tax
      preparers, real estate professionals, and others).

      HIPAA / HI-TECH (Health Insurance Portability and
      Accountability Act)
      Applies to anyone who handles personal health
      information and health insurance information - as well as
      those who service or support healthcare organizations.
State Laws

       48 states now have one or more laws
       that hold businesses responsible for
       protecting the customer information
       they collect.

       State laws are also interstate laws.

       Businesses typically must comply with
       laws in states where any of their
       customers reside.
State Laws


         Nevada State Law
         ( NRS 603A.010 Breach Notification Law)
Industry Regulations

        PCI Compliance (Payment Card Industry)
        Applies to anyone who accepts credit cards



        Enforced by the PCI Standards Council
        and all merchant banks that handle card
        processing
Who Must Comply?
Does your business collect, process or store:

        Any personally identifiable information for
         your CUSTOMERS?
          Name, address, social security number, driver's license
           number, birth dates, maiden name, etc.
        Any financial information for your
         CUSTOMERS?
          Checking/bank accounts, loans, insurance, credit reports,
           taxes, accounting, investments, debts, collections, real
           estate information, etc.
Who Must Comply?

Does your business:
  Extend credit or payment terms?
  Invoice or bill your customers?
  Accept credit cards?
  Share customer or employee information
    with third parties?
Who Must Comply?

Does your business collect, process or store:
  Any health related information?
         Medical records, treatment, health insurance, billing, etc.
        Any personal information about your
         EMPLOYEES?
         Name, address, social security number, birth date, health
          insurance, spouse/family, tax information, 401K, etc.
If you answered “YES” to any of these
            questions –

 …You are held liable under one or
more federal and state law or industry
             regulation.
Fines, Penalties, Liabilities…
Payment Card Industry (PCI)
   High transaction fees
   $10,000 fine on first violation
   Account termination
Civil or Criminal Action
   Individual and class action lawsuits
   Punitive damages, possible imprisonment for
    reckless or negligent disclosure
Fines, Penalties, Liabilities…
Federal
   Starts at $2,500 - $3,500 fine per record lost or
    stolen
   Up to millions per violation or incident
   Owners and officers can be held personally liable
States
   Fines and penalties ranging from $500 to $5,000
    per record lost or stolen
Non-Compliance Risks:
Fines, Penalties, Liabilities


In the event of a breach…
Heavy fines and penalties for negligence can be
assessed against your business, and owners can be
held personally liable.
Serious Threat…
Serious Consequences…
How to:
  PROTECT your customers,
 employees, and your business.

Get COMPLIANT with all the laws
       and regulations.
“Reasonableness” Standard

          (It doesn’t have to be
        complex and expensive…)

“In our investigations, we look at the overall
security the firm has implemented and its
reasonableness… I emphasize that the
standard is “reasonableness”, not perfection.”
(FTC Chairman, Deborah Platt Majoras)
Top 10 recommendations

1. Administrative Safeguards
2. Technical Safeguards
3. Breach Response Plan
4.   Certification
5.   Customer Privacy A ssurance
6.   Cybercrime Insurance Policy
7.   Online Reputation Management
8.   Check Y Credit Report
              ou
     9. Use Only Secured Credit Cards
      1 0. Work with a Certified Information Secrutiy Advisor
Protection & Compliance


1. Administrative Safeguards:
      (“P eopl and “P aper”)
             e”
  Information Security Policy
  Privacy Notice for customers
  Compliance A dministrator training
  Employee Training program
  Regular compliance updates
Protection & Compliance


2. Technical Safeguards:
  Computer Security
     Professional grade security software
     Quarterly security checkups on every computer

  Vulnerability Management
     Penetration testing
     Microsoft, other software security patches/
                                                fixes
  Data Encryption Software
  Secure Data Disposal – computers, hard drives, copiers, etc.
Protection & Compliance


3. Breach Response Plan:
  Breach Response
     Discovery
       Investigation – find out what happened
       Reporting to proper authorities
       A ssistance with criminal prosecution
     Policy Review / Update
        Closing security holes & revising your policies & procedures
     Public Relations / Compliance
       Help with letters/
                         communications to customers
       Help with remediation (ID theft protection) for victims
       Help dealing with the press
Protection & Compliance


4. Certification:
   Y Business Certified
     our
      Y business meets or exceeds minimum requirements in federal,
        our
       state and industry regulations for protecting customers and employees
       against ID theft and fraud.
      “Good Housekeeping” seal of approval that your business is a safe
       place to do business.
   Ongoing Certification
      Monthly/
              Quarterly/ nnually
                       A
   Legal Validation
      Back you up should legal problems arise
      “Safe Harbor” status
5. Customer Privacy Assurance
> > Increase customer trust and loyalty.
> > Increase customer referrals, new customers.

  Certification seal
     For your website, office, etc.
  Customer Notification
     Letter, announcement
  Press Release
6. Cyber Insurance Policy
 Business insurance policy, E & O may not protect
  you from fines and penalties
 Cyber insurance policy can protect you by data
  breaches within your company
7. Online Reputation Management:
 Online social media networking protection
 Creating good press about your name and business
 Press Releases
 Moving bad press to the back on search engines
8. Check Y Credit Report
          ou
 Check your credit report 4 times a year
 A your young family members
   lso
9. Use Secured Credit Cards
 Avoid using credit cards with the WiFi sign on the
  back of the card.
 Have your bank reissue a new card.
1 0. Work with a CISA consultant
  Certified Information System Advisor
For more information on upcoming
   seminars on compliance and
regulations protection contact us at
          702-868-0808
   MJ Computer Concepts Inc.




   Thank you!

More Related Content

What's hot

Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
guestabd20
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
Hubbard Insurance Group
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
Act-On Software
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
Christopher Rieser
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
guest95afa8
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
susantj3
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
Resilient Systems
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
HB Litigation Conferences
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
Ethan S. Burger
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
KP Naidu
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
Donny Shimamoto
 

What's hot (20)

Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
1 s2.0-s0167404801002097-main
1 s2.0-s0167404801002097-main1 s2.0-s0167404801002097-main
1 s2.0-s0167404801002097-main
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 

Viewers also liked

Intl Com Of Cn Film Culture Survey
Intl Com Of Cn Film Culture SurveyIntl Com Of Cn Film Culture Survey
Intl Com Of Cn Film Culture Survey
NewlandYue
 
2011インターンシップ_09N1123_前野沙織
2011インターンシップ_09N1123_前野沙織2011インターンシップ_09N1123_前野沙織
2011インターンシップ_09N1123_前野沙織saolympic
 
try { harder } 2011 Inception of Control
try { harder } 2011   Inception of Controltry { harder } 2011   Inception of Control
try { harder } 2011 Inception of Control
tschneidereit
 
งานนำเสนอบทที่3
งานนำเสนอบทที่3งานนำเสนอบทที่3
งานนำเสนอบทที่3sawitri555
 
Xabier,itzea,peio and asier n
Xabier,itzea,peio and asier nXabier,itzea,peio and asier n
Xabier,itzea,peio and asier nartxandape
 
Hari raya aidilfitri
Hari raya aidilfitriHari raya aidilfitri
Hari raya aidilfitriAin Azmi
 
Boolean Operators
Boolean OperatorsBoolean Operators
Boolean Operatorsgvsulib
 
Teste português natal 1ano
Teste português natal 1anoTeste português natal 1ano
Teste português natal 1ano
isabel ferreira santos
 
Postgre Diagram
Postgre DiagramPostgre Diagram
Postgre Diagram
khacthuong2008
 
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu 218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu exodumuser
 
SFDZA2011 - Keynote by Bojan Ivanovic
SFDZA2011 - Keynote by Bojan IvanovicSFDZA2011 - Keynote by Bojan Ivanovic
SFDZA2011 - Keynote by Bojan IvanovictheBojangles
 
Lembar 1 pengumuman hasil tkd cpns 2014
Lembar 1 pengumuman hasil tkd cpns 2014Lembar 1 pengumuman hasil tkd cpns 2014
Lembar 1 pengumuman hasil tkd cpns 2014
Hendra Sirait
 
Slideshare2
Slideshare2Slideshare2
Slideshare2buildva
 
Busqueda en google
Busqueda en googleBusqueda en google
Busqueda en google
nilaroxana21
 

Viewers also liked (17)

Intl Com Of Cn Film Culture Survey
Intl Com Of Cn Film Culture SurveyIntl Com Of Cn Film Culture Survey
Intl Com Of Cn Film Culture Survey
 
2011インターンシップ_09N1123_前野沙織
2011インターンシップ_09N1123_前野沙織2011インターンシップ_09N1123_前野沙織
2011インターンシップ_09N1123_前野沙織
 
try { harder } 2011 Inception of Control
try { harder } 2011   Inception of Controltry { harder } 2011   Inception of Control
try { harder } 2011 Inception of Control
 
งานนำเสนอบทที่3
งานนำเสนอบทที่3งานนำเสนอบทที่3
งานนำเสนอบทที่3
 
Xabier,itzea,peio and asier n
Xabier,itzea,peio and asier nXabier,itzea,peio and asier n
Xabier,itzea,peio and asier n
 
Farsund digitalworkshop
Farsund digitalworkshopFarsund digitalworkshop
Farsund digitalworkshop
 
Phan6
Phan6Phan6
Phan6
 
Hari raya aidilfitri
Hari raya aidilfitriHari raya aidilfitri
Hari raya aidilfitri
 
Boolean Operators
Boolean OperatorsBoolean Operators
Boolean Operators
 
Teste português natal 1ano
Teste português natal 1anoTeste português natal 1ano
Teste português natal 1ano
 
Postgre Diagram
Postgre DiagramPostgre Diagram
Postgre Diagram
 
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu 218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
 
SFDZA2011 - Keynote by Bojan Ivanovic
SFDZA2011 - Keynote by Bojan IvanovicSFDZA2011 - Keynote by Bojan Ivanovic
SFDZA2011 - Keynote by Bojan Ivanovic
 
Lembar 1 pengumuman hasil tkd cpns 2014
Lembar 1 pengumuman hasil tkd cpns 2014Lembar 1 pengumuman hasil tkd cpns 2014
Lembar 1 pengumuman hasil tkd cpns 2014
 
Slideshare2
Slideshare2Slideshare2
Slideshare2
 
dmexco SDL
dmexco SDLdmexco SDL
dmexco SDL
 
Busqueda en google
Busqueda en googleBusqueda en google
Busqueda en google
 

Similar to Powerpoint mack jackson

Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
Sue Tjernlund
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
danc752
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
Herring Consulting & Financial Group
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
Bucacci Business Solutions
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
oldshaman
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
Strategic Insurance Software
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
CBIZ, Inc.
 
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesEster Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ramon Ray
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Fines
masive213
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Don Grauel
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
Charles Seay
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
Kelly Giambra
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
bpeacher
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
CBIZ, Inc.
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 

Similar to Powerpoint mack jackson (20)

Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
IDT 2015
IDT 2015IDT 2015
IDT 2015
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesEster Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Fines
 
Adrs2
Adrs2Adrs2
Adrs2
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 

Recently uploaded

Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
DOT TECH
 
Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1
Fitri Safira
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
GRAPE
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
how can I sell my pi coins for cash in a pi APP
how can I sell my pi coins for cash in a pi APPhow can I sell my pi coins for cash in a pi APP
how can I sell my pi coins for cash in a pi APP
DOT TECH
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
InterCars
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
how can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securelyhow can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securely
DOT TECH
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
DOT TECH
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
Avanish Goel
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Henry Tapper
 
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit CardPoonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
nickysharmasucks
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
一比一原版UOL毕业证利物浦大学毕业证成绩单如何办理
一比一原版UOL毕业证利物浦大学毕业证成绩单如何办理一比一原版UOL毕业证利物浦大学毕业证成绩单如何办理
一比一原版UOL毕业证利物浦大学毕业证成绩单如何办理
ydubwyt
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 

Recently uploaded (20)

Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
 
Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
how can I sell my pi coins for cash in a pi APP
how can I sell my pi coins for cash in a pi APPhow can I sell my pi coins for cash in a pi APP
how can I sell my pi coins for cash in a pi APP
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
how can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securelyhow can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securely
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
 
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit CardPoonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
一比一原版UOL毕业证利物浦大学毕业证成绩单如何办理
一比一原版UOL毕业证利物浦大学毕业证成绩单如何办理一比一原版UOL毕业证利物浦大学毕业证成绩单如何办理
一比一原版UOL毕业证利物浦大学毕业证成绩单如何办理
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 

Powerpoint mack jackson

  • 1. Protecting Your Business from the Single Greatest Threat of the 21st Century Presented by: Mack Jackson MJ Computer Concepts Inc.
  • 2. Identity Theft  Is the fastest growing crime of the 21st century  Something few people know about, and even fewer know what to do about it  It directly affects you, your customers and your employees  There are new federal, state and industry regulations that require you to take action
  • 3. Knowledge is Power  Protect your business – and keep out of legal trouble  Gain the trust, loyalty of your customers  Protect your employees  Set yourself apart from your competitors
  • 4. Digital Connected World • Computers, Internet, smart phones • Amazing technologies, opportunities • Exciting age of information and communication
  • 5. With the amazing technology, comes the bad people…  The “Cyber Criminal”  Crooks have adapted  The new threats we face are devastating  The unprepared and complacent are being victimized
  • 6. The Crime: Identity Theft and Fraud Personal Financial Medical Criminal
  • 7. Identity Theft and Fraud  Confidential information is the new currency of thieves  Sophisticated under ground market for stolen personal and financial information  Old school theft  Today’s Cyber Criminal  Doctor’s Office  Family Members
  • 8. Why should you be concerned as a business owner or manager?
  • 9. Businesses: The main source of stolen identities, cyber-crime and fraud in America.
  • 10. The Problem: Exposure, Loss or Theft of…  Customer information  Employee information  Business information  Financial information Photo Copiers NY Cyber Ring Bust
  • 11. The Problem:  Over 500 million customer/employee records lost or stolen since 2005 (Privacy Rights Clearinghouse)  Up to 88% of lost or stolen records is due to employee negligence or fraud. (Ponemon Institute, 2009)
  • 12. Small Businesses: The Target  85% of fraud occurs in small businesses. (VISA Security Summit, International Council for Small Business)  $54 billion in damages to SMB’s in 2009 – up 12.5% (Javelin Research)  Small business owners identity stolen 1.5 times more than others (Javelin Research)
  • 13. How it Happens:  Employees/Insiders  Hackers/Criminals
  • 14. How it Happens:  Viruses, spyware, keyloggers  Social engineering, phishing  Computer hi-jacking  “Dumpster-divers”
  • 15. What’s at Stake? Devastating consequences with a data breach!
  • 16. Lost CUSTOMERS  Lost trust and loyalty  After a data breach:  40% will consider ending the relationship  20% will no longer do business with you  5% are considering legal action (CIO Magazine)
  • 17. Damaged IMAGE  Your personal and business reputation is at stake
  • 18. Stolen Money  Global cyber-crime rings stealing money directly from business bank accounts
  • 19. Recovery COSTS  Disruption of business  Financial damages  Customer reparations  Restore image
  • 20. BUSINESSES now bear the biggest liability and the greatest financial risk from identity theft and fraud
  • 21. Major Federal Laws Red Flags Rule Applies to anyone who arranges for or extends credit or payment terms, or who provides products or services and bills or invoices the customer. GLBA (Gramm-Leach-Bliley Act) Applies to any business or organization that handles personal financial related information (such as banks, insurance/securities agencies, lenders, accountants & tax preparers, real estate professionals, and others). HIPAA / HI-TECH (Health Insurance Portability and Accountability Act) Applies to anyone who handles personal health information and health insurance information - as well as those who service or support healthcare organizations.
  • 22. State Laws 48 states now have one or more laws that hold businesses responsible for protecting the customer information they collect. State laws are also interstate laws. Businesses typically must comply with laws in states where any of their customers reside.
  • 23. State Laws Nevada State Law ( NRS 603A.010 Breach Notification Law)
  • 24. Industry Regulations PCI Compliance (Payment Card Industry) Applies to anyone who accepts credit cards Enforced by the PCI Standards Council and all merchant banks that handle card processing
  • 25. Who Must Comply? Does your business collect, process or store:  Any personally identifiable information for your CUSTOMERS?  Name, address, social security number, driver's license number, birth dates, maiden name, etc.  Any financial information for your CUSTOMERS?  Checking/bank accounts, loans, insurance, credit reports, taxes, accounting, investments, debts, collections, real estate information, etc.
  • 26. Who Must Comply? Does your business:  Extend credit or payment terms?  Invoice or bill your customers?  Accept credit cards?  Share customer or employee information with third parties?
  • 27. Who Must Comply? Does your business collect, process or store:  Any health related information?  Medical records, treatment, health insurance, billing, etc.  Any personal information about your EMPLOYEES?  Name, address, social security number, birth date, health insurance, spouse/family, tax information, 401K, etc.
  • 28. If you answered “YES” to any of these questions – …You are held liable under one or more federal and state law or industry regulation.
  • 29. Fines, Penalties, Liabilities… Payment Card Industry (PCI)  High transaction fees  $10,000 fine on first violation  Account termination Civil or Criminal Action  Individual and class action lawsuits  Punitive damages, possible imprisonment for reckless or negligent disclosure
  • 30. Fines, Penalties, Liabilities… Federal  Starts at $2,500 - $3,500 fine per record lost or stolen  Up to millions per violation or incident  Owners and officers can be held personally liable States  Fines and penalties ranging from $500 to $5,000 per record lost or stolen
  • 31. Non-Compliance Risks: Fines, Penalties, Liabilities In the event of a breach… Heavy fines and penalties for negligence can be assessed against your business, and owners can be held personally liable.
  • 33. How to: PROTECT your customers, employees, and your business. Get COMPLIANT with all the laws and regulations.
  • 34. “Reasonableness” Standard (It doesn’t have to be complex and expensive…) “In our investigations, we look at the overall security the firm has implemented and its reasonableness… I emphasize that the standard is “reasonableness”, not perfection.” (FTC Chairman, Deborah Platt Majoras)
  • 35. Top 10 recommendations 1. Administrative Safeguards 2. Technical Safeguards 3. Breach Response Plan 4. Certification 5. Customer Privacy A ssurance 6. Cybercrime Insurance Policy 7. Online Reputation Management 8. Check Y Credit Report ou 9. Use Only Secured Credit Cards 1 0. Work with a Certified Information Secrutiy Advisor
  • 36. Protection & Compliance 1. Administrative Safeguards: (“P eopl and “P aper”) e”  Information Security Policy  Privacy Notice for customers  Compliance A dministrator training  Employee Training program  Regular compliance updates
  • 37. Protection & Compliance 2. Technical Safeguards:  Computer Security  Professional grade security software  Quarterly security checkups on every computer  Vulnerability Management  Penetration testing  Microsoft, other software security patches/ fixes  Data Encryption Software  Secure Data Disposal – computers, hard drives, copiers, etc.
  • 38. Protection & Compliance 3. Breach Response Plan:  Breach Response  Discovery  Investigation – find out what happened  Reporting to proper authorities  A ssistance with criminal prosecution  Policy Review / Update  Closing security holes & revising your policies & procedures  Public Relations / Compliance  Help with letters/ communications to customers  Help with remediation (ID theft protection) for victims  Help dealing with the press
  • 39. Protection & Compliance 4. Certification:  Y Business Certified our  Y business meets or exceeds minimum requirements in federal, our state and industry regulations for protecting customers and employees against ID theft and fraud.  “Good Housekeeping” seal of approval that your business is a safe place to do business.  Ongoing Certification  Monthly/ Quarterly/ nnually A  Legal Validation  Back you up should legal problems arise  “Safe Harbor” status
  • 40. 5. Customer Privacy Assurance > > Increase customer trust and loyalty. > > Increase customer referrals, new customers.  Certification seal  For your website, office, etc.  Customer Notification  Letter, announcement  Press Release
  • 41. 6. Cyber Insurance Policy  Business insurance policy, E & O may not protect you from fines and penalties  Cyber insurance policy can protect you by data breaches within your company
  • 42. 7. Online Reputation Management:  Online social media networking protection  Creating good press about your name and business  Press Releases  Moving bad press to the back on search engines
  • 43. 8. Check Y Credit Report ou  Check your credit report 4 times a year  A your young family members lso
  • 44. 9. Use Secured Credit Cards  Avoid using credit cards with the WiFi sign on the back of the card.  Have your bank reissue a new card.
  • 45. 1 0. Work with a CISA consultant  Certified Information System Advisor
  • 46. For more information on upcoming seminars on compliance and regulations protection contact us at 702-868-0808 MJ Computer Concepts Inc. Thank you!

Editor's Notes

  1. Over 10 million new victims 1 in 20 Adults Most vulnerable In Nevada 100,000 people How many of you know….. The internet technology bred savvy criminal more then law enforcement
  2. We have have all heard of Identity theft in the news. How it has affected the financial well being of countless individuals. Did you know that business owners are liable for stolen records of their customer and employees As a business owner you are responsible for protecting….. Federal laws?
  3. As business owners, we can protect ourselves with a little knowledge. Knowledge is power! If you know how to protect yourself, and your company, you fight back against ID T. With this knowledge, you will be a respected business, gain the trust and loyalty of your customers and protect your employees. This information can set your business far apart from your comp.
  4. Text more then talk on the phone stat. Friend fell in fountain OMG Nevada cell phone law Judi running stop sign
  5. So, who are the cyber criminals? National and Overseas under ground.
  6. Medical story – Health insurance usage and drugs Criminal – Bank robbery as your id
  7. Speakers are business owners
  8. Medical office throw out old patient records
  9. Some of you may think these rule are overwhelming. How much it would cost to hire a attorney, chief compliance officer, It director, web manager…. No, it does not.