The Cyber War on Small Business

Similar documents
Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Personal Cybersecurity

Legal Aspects of Cybersecurity

Cybersecurity The Evolving Landscape

Cyber Attack: Is Your Business at Risk?

Service Provider View of Cyber Security. July 2017

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Reviewing the 2017 Verizon DBIR

Why you MUST protect your customer data

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Employee Security Awareness Training

Cyber Security Updates and Trends Affecting the Real Estate Industry

Cyber Security. The Question of the Day. Sylint Group, Inc. How did we come up with the company name Sylint and what does it mean?

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Insider Threats: Actual Attacks by Current and Former Software Engineers

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

Train employees to avoid inadvertent cyber security breaches

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Understanding the Changing Cybersecurity Problem

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Governance Ideas Exchange

Cyber Risks in the Boardroom Conference

Challenges and. Opportunities. MSPs are Facing in Security

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Chapter 12. Information Security Management

Cyber Risk for. Small and Medium-Sized Enterprises (SMEs)

A practical guide to IT security

Cyber Insurance: What is your bank doing to manage risk? presented by

Cybersecurity and Hospitals: A Board Perspective

Cyber-Threats and Countermeasures in Financial Sector

Express Monitoring 2019

Caribbean Cyber Security: Not Only Government s Responsibility

Cybersecurity for Health Care Providers

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Automated Context and Incident Response

2017 Annual Meeting of Members and Board of Directors Meeting

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

716 West Ave Austin, TX USA

Cyber Crime Update. Mark Brett Programme Director February 2016

IS Today: Managing in a Digital World 9/17/12

mhealth SECURITY: STATS AND SOLUTIONS

Cyber fraud and its impact on the NHS: How organisations can manage the risk

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Jeff Wilbur VP Marketing Iconix

Risky Business. How Secure is Your Dealership s Information? By Robert Gibbs

Defending Our Digital Density.

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

The Evolution of : Continuous Advanced Threat Protection

The Enemy Within: Dealing with Insider Threats

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Building a Threat Intelligence Program

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Breaches and Remediation

CHIME and AEHIS Cybersecurity Survey. October 2016

Information Security in Corporation

Business continuity management and cyber resiliency

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

6 Vulnerabilities of the Retail Payment Ecosystem

0x70 Eric Bärenzung. Cyber risks. in the satellite industry

Cybersecurity and Nonprofit

June 2 nd, 2016 Security Awareness

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

Kaspersky Small Office Security 5. Product presentation

What to do if your business is the victim of a data or security breach?

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

LCU Privacy Breach Response Plan

FairWarning Mapping to PCI DSS 3.0, Requirement 10

2017 RIMS CYBER SURVEY

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Security Risk Management and Identity Theft

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

How to Optimize Cyber Defenses through Risk-Based Governance. Steven Minsky CEO of LogicManager & Author of the RIMS Risk Maturity Model

Effective Cyber Incident Response in Insurance Companies

A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk

Regulation P & GLBA Training

Cybersecurity 2016 Survey Summary Report of Survey Results

CYBER SECURITY WORKSHOP NOVEMBER 2, Anurag Sharma [CISA, CISSP, CRISC] Principal Cyber & Information Security Services

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Potential business impact of cybercrime on small and medium enterprises (SMEs) in 2016 Survey report USA. October, 2016

The Data Breach: How to Stay Defensible Before, During & After the Incident

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

CYBER SECURITY AND MITIGATING RISKS

Cybersecurity, safety and resilience - Airline perspective

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Cyber and data security How prepared is your charity?

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

From Russia With Love

Transcription:

The Cyber War on Small Business Dillon Behr Executive Lines Broker Risk Placement Services, Inc.

Meet Our Speaker Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Previously worked as Cyber Security threat Intelligence Analyst for Discover Financial Services and the US government. Focused on finding cyber liability and breach response solutions for clients of all types and sizes. Risk Placement Services (RPS) is a Managing General Agent/Underwriting Manager and nationally focused wholesale insurance broker. Ranked in the top five in every insurance industry category and have been consistently ranked as the largest MGA in the country for several years. Known for doing the right thing even if it means referring business to a competitor

The Cyberwar on Small Business According to the 2016 State of SMB Cybersecurity Report, in the last 12 months, hackers have breached HALF of all small businesses in the United States

Small Business Are: the principal targets of cyber crime especially susceptible to phishing attacks via email or fraudulent activity happening in their e-commerce shops. Attacks can derail money-making activities for up to a week

The Stats

Who s Behind Breaches? * Verizon 2017 Data Breach Investigations Report

What Tactics are Used? Hacking Malware Stolen/weak passwords Social attacks Errors/Privilege misuse Physical actions * Verizon 2017 Data Breach Investigations Report

Effects of Cyber Breaches % of Business Opportunity Lost % of Organizational Revenue Lost

Business Functions Most Likely to be Effected

Small Businesses Should Focus on Cyber Security Most business, regardless of size, collect, process, and store large amounts of data on computers and other device This data could be sensitive information for which unauthorized access or exposure could result in negative consequences if breached When this data is transmitted from one device to another while doing business, it is important that this data is protected from cyber attacks

A Cyber Attack is Inevitable Does your business have technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access?

RESPOND, RESTORE, ENSURE The National Cyber Security Alliance advises that companies must be prepared to RESPOND to the inevitable cyber incident, RESTORE normal operations, and ENSURE that company assets and the company s reputation are protected.

Being PROACTIVE is the 1 st Step Perform software updates - #1 overlooked thing that small business owners don t do Enable two-factor authentication Perform regular backups of company data Create stronger passwords Install antivirus software Purchase Cyber Liability Insurance helps to mitigate losses from a variety of cyber incidents, including data breaches, business interruptions and network damage.

Data Breaches Can Occur Offline Too A cyber breach is not the only way that business data can be compromised. Physical theft can also result in data breaches when your company data (computer, server, mobile device, or physical records) is taken without authorization. Treat physical security with the same level of attention as cyber security. Monitor and restrict access to stored data, enforce strict policies regarding locking and protecting computers and mobile devices, establish strict policies for data disposal, and train employees to be aware of suspicious activities.

Data Handling Best Practices & Guidelines

Attacks Will Cost You! 82% of small business owners don t think they will be attacked because they don t have anything worth stealing. This is why they are targeted by hackers! Cyber Security Statistics Numbers Small Businesses Need to Know (www.smallbiztrends.com) These companies spent an average of $879,582 because of damage or theft of IT assets Disruption to normal operations cost an average of $955,429 Emails, phone numbers and billing addresses are valuable to cyber criminals NFIB can help your business access protection through NFIB Commercial Insurance.

QUESTIONS?