Powerpoint mack jackson
-
Upload
aiimnevada -
Category
Economy & Finance
-
view
383 -
download
1
description
Transcript of Powerpoint mack jackson
![Page 1: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/1.jpg)
Presented by:
Mack JacksonMJ Computer Concepts
Inc.
from the
Single Greatest Threatof the 21st Century
Protecting Your Business
![Page 2: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/2.jpg)
Identity Theft
Is the fastest growing crime of the 21st century
Something few people know about, and even fewer know what to do about it
It directly affects you, your customers and your employees
There are new federal, state and industry regulations that require you to take action
![Page 3: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/3.jpg)
Knowledge is Power
Protect your business – and keep out of legal trouble
Gain the trust, loyalty of your customers Protect your employees Set yourself apart from your competitors
![Page 4: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/4.jpg)
Digital Connected World
• Computers, Internet, smart phones
• Amazing technologies, opportunities
• Exciting age of information and communication
![Page 5: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/5.jpg)
With the amazing technology, comes the bad people…
The “Cyber Criminal” Crooks have adapted The new threats we face are devastating The unprepared and complacent are being
victimized
![Page 6: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/6.jpg)
Identity Theft and Fraud
The Crime:
PersonalFinancialMedicalCriminal
![Page 7: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/7.jpg)
Identity Theftand Fraud
Confidential information is the new currency of thieves
Sophisticated under ground market for stolen personal and financial information
Old school theft Today’s Cyber Criminal Doctor’s Office Family Members
![Page 8: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/8.jpg)
Why should you be concernedas a business owner
or manager?
![Page 9: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/9.jpg)
Businesses:
The main source of stolen identities, cyber-crime and fraud in America.
![Page 10: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/10.jpg)
The Problem:
Exposure, Loss or Theft of…
Photo Copiers
NY Cyber Ring Bust
Customer information Employee information Business information Financial information
![Page 11: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/11.jpg)
The Problem:
Over 500 million customer/employee records lost or stolen since 2005 (Privacy Rights Clearinghouse)
Up to 88% of lost or stolen records is due to employee negligence or fraud. (Ponemon Institute, 2009)
![Page 12: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/12.jpg)
Small Businesses:The Target
85% of fraud occursin small businesses.(VISA Security Summit,International Council for Small Business)
$54 billion in damages to SMB’s in 2009 – up 12.5%(Javelin Research)
Small business owners identity stolen 1.5 times more than others (Javelin Research)
![Page 13: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/13.jpg)
How it Happens:
Employees/Insiders Hackers/Criminals
![Page 14: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/14.jpg)
How it Happens:
Viruses, spyware, keyloggers Social engineering, phishing Computer hi-jacking “Dumpster-divers”
![Page 15: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/15.jpg)
What’s at Stake?Devastating consequences
with a data breach!
![Page 16: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/16.jpg)
Lost CUSTOMERS
Lost trust and loyalty After a data breach:
40% will consider ending the relationship
20% will no longer do business with you
5% are considering legal action(CIO Magazine)
![Page 17: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/17.jpg)
Damaged IMAGE
Your personal and business reputation is at stake
![Page 18: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/18.jpg)
Stolen Money
Global cyber-crime rings stealing money directly from business bank accounts
![Page 19: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/19.jpg)
Recovery COSTS
Disruption of business Financial damages Customer reparations Restore image
![Page 20: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/20.jpg)
BUSINESSES now bear the biggest liability and the
greatest financial risk from identity theft and fraud
![Page 21: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/21.jpg)
Red Flags Rule Applies to anyone who arranges for or extends credit or payment terms, or who provides products or services and bills or invoices the customer.
GLBA (Gramm-Leach-Bliley Act) Applies to any business or organization that handles personal financial related information (such as banks, insurance/securities agencies, lenders, accountants & tax preparers, real estate professionals, and others).
HIPAA / HI-TECH (Health Insurance Portability and Accountability Act)Applies to anyone who handles personal health information and health insurance information - as well as those who service or support healthcare organizations.
Major Federal Laws
![Page 22: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/22.jpg)
State Laws
48 states now have one or more laws that hold businesses responsible for protecting the customer information they collect.
State laws are also interstate laws.
Businesses typically must comply with laws in states where any of their customers reside.
![Page 23: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/23.jpg)
State Laws
Nevada State Law( NRS 603A.010 Breach Notification Law)
![Page 24: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/24.jpg)
Industry Regulations
PCI Compliance (Payment Card Industry)
Applies to anyone who accepts credit cards
Enforced by the PCI Standards Council and all merchant banks that handle card processing
![Page 25: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/25.jpg)
Who Must Comply?
Any personally identifiable information for your CUSTOMERS?
Name, address, social security number, driver's license number, birth dates, maiden name, etc.
Any financial information for your CUSTOMERS?
Checking/bank accounts, loans, insurance, credit reports, taxes, accounting, investments, debts, collections, real estate information, etc.
Does your business collect, process or store:
![Page 26: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/26.jpg)
Who Must Comply?
Does your business: Extend credit or payment terms? Invoice or bill your customers? Accept credit cards? Share customer or employee information
with third parties?
![Page 27: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/27.jpg)
Who Must Comply?
Does your business collect, process or store: Any health related information?
Medical records, treatment, health insurance, billing, etc.
Any personal information about your EMPLOYEES?
Name, address, social security number, birth date, health insurance, spouse/family, tax information, 401K, etc.
![Page 28: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/28.jpg)
If you answered “YES” to any of these questions –
…You are held liable under one or more federal and state law or
industry regulation.
![Page 29: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/29.jpg)
Fines, Penalties, Liabilities…
Payment Card Industry (PCI) High transaction fees $10,000 fine on first violation Account termination
Civil or Criminal Action Individual and class action lawsuits Punitive damages, possible imprisonment for
reckless or negligent disclosure
![Page 30: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/30.jpg)
Fines, Penalties, Liabilities…
Federal Starts at $2,500 - $3,500 fine per record lost or
stolen Up to millions per violation or incident Owners and officers can be held personally liable
States Fines and penalties ranging from $500 to $5,000
per record lost or stolen
![Page 31: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/31.jpg)
Non-Compliance Risks:Fines, Penalties, Liabilities
In the event of a breach…
Heavy fines and penalties for negligence can be assessed against your business, and owners can be held personally liable.
![Page 32: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/32.jpg)
Serious Threat…
Serious Consequences…
![Page 33: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/33.jpg)
How to:
PROTECT your customers, employees, and your business.
Get COMPLIANT with all the lawsand regulations.
![Page 34: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/34.jpg)
“Reasonableness” Standard
(It doesn’t have to becomplex and expensive…)
“In our investigations, we look at the overall security the firm has implemented and its reasonableness… I emphasize that the standard is “reasonableness”, not perfection.” (FTC Chairman, Deborah Platt Majoras)
![Page 35: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/35.jpg)
1. Administrative Safeguards2. Technical Safeguards 3. Breach Response Plan 4. Certification5. Customer Privacy Assurance
Top 10 recommendations
6. Cybercrime Insurance Policy
7. Online Reputation Management
8. Check You Credit Report9. Use Only Secured Credit Cards
10. Work with a Certified Information Secrutiy Advisor
![Page 36: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/36.jpg)
Protection & Compliance
1. Administrative Safeguards: (“People” and “Paper”)
Information Security Policy Privacy Notice for customers Compliance Administrator training Employee Training program Regular compliance updates
![Page 37: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/37.jpg)
Protection & Compliance
2. Technical Safeguards: Computer Security
Professional grade security software Quarterly security checkups on every computer
Vulnerability Management Penetration testing Microsoft, other software security patches/fixes
Data Encryption Software Secure Data Disposal – computers, hard
drives, copiers, etc.
![Page 38: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/38.jpg)
Protection & Compliance
3. Breach Response Plan: Breach Response
Discovery Investigation – find out what happened Reporting to proper authorities Assistance with criminal prosecution
Policy Review / Update Closing security holes & revising your policies &
procedures Public Relations / Compliance
Help with letters/communications to customers Help with remediation (ID theft protection) for
victims Help dealing with the press
![Page 39: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/39.jpg)
Protection & Compliance
4. Certification: Your Business Certified
Your business meets or exceeds minimum requirements in federal, state and industry regulations for protecting customers and employees against ID theft and fraud.
“Good Housekeeping” seal of approval that your business is a safe place to do business.
Ongoing Certification Monthly/Quarterly/Annually
Legal Validation Back you up should legal problems arise “Safe Harbor” status
![Page 40: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/40.jpg)
5. Customer Privacy Assurance>> Increase customer trust and loyalty.>> Increase customer referrals, new customers. Certification seal
For your website, office, etc.
Customer Notification Letter, announcement
Press Release
![Page 41: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/41.jpg)
6. Cyber Insurance Policy
Business insurance policy, E & O may not protect you from fines and penalties
Cyber insurance policy can protect you by data breaches within your company
![Page 42: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/42.jpg)
7. Online Reputation Management: Online social media networking
protection Creating good press about your name
and business Press Releases Moving bad press to the back on search
engines
![Page 43: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/43.jpg)
8. Check You Credit Report
Check your credit report 4 times a year Also your young family members
![Page 44: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/44.jpg)
9. Use Secured Credit Cards
Avoid using credit cards with the WiFi sign on the back of the card.
Have your bank reissue a new card.
![Page 45: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/45.jpg)
10. Work with a CISA consultant
Certified Information System Advisor
![Page 46: Powerpoint mack jackson](https://reader033.fdocuments.us/reader033/viewer/2022051013/547536cfb4af9fcd0a8b5921/html5/thumbnails/46.jpg)
Thank you!
For more information on upcoming seminars on
compliance and regulations protection contact us at 702-868-
0808 MJ Computer Concepts Inc.