STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

How to protect yourself, your computer, and others on the internet
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Introduction and Overview of Digital Crime and Digital Terrorism
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION.
CYBER CRIME AND SECURITY TRENDS
SiteLock Internet Security: Big Threats for Small Business.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
National Cybersecurity Awareness Campaign: Chatting with Kids About Being Online.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
General Awareness Training
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
PCI: As complicated as it sounds? Gerry Lawrence CTO
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Cyber Security Nevada Businesses Overview June, 2014.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Data Security.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Information Security Program
Payment card industry data security standards
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Forensics Week 11.
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Andy Hall – Cyber & Tech INSURANCE Specialist
Cybersecurity Am I concerned?
CYBERSAFETY & Personal information
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION

ABOUT STOP.THINK.CONNECT.™ In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing cybersecurity awareness campaign – Stop.Think.Connect. – to help Americans understand the risks that come with being online. Stop.Think.Connect. challenges the American public to be more vigilant about practicing safe online habits and persuades Americans to view Internet safety as a shared responsibility in the home, in the workplace, and in our communities.

SHARED RESPONSIBILITY For small business owners, business growth is the name of the game. It’s important to establish a cybersecurity protocol early that can grow with your business to protect your most critical assets. Not only do businesses rely on technology to perform daily functions, but the Internet provides easy ways for businesses to stay connected and informed. However, with these increased conveniences comes increased risks. Many of the crimes that occur in real life are now facilitated through the Internet, including human trafficking, credit card fraud, identity theft, and embezzlement. No country, industry, community, or individual is immune to cyber risks, and no single government agency, company, or individual can solve our cybersecurity challenges. We all have to work together to secure cyberspace.

DID YOU KNOW? Forty-four percent of small businesses reported being the victim of a cyber attack, with an average cost of approximately $9,000 per attack. 1 Nearly 59 percent of U.S. small and medium-sized businesses do not have a contingency plan that outlines procedures for responding to and reporting data breach losses Small Business Technology Survey, National Small Business Association 2.

THE REALITY OF CYBER ATTACKS All businesses, regardless of size, are at risk. Small businesses may feel like they are not targets for cyber attacks either due to their size or the perception that they don't have anything worth stealing. Only a small percentage of cyber attacks are considered targeted attacks, meaning the attacker group is going after a particular company or group of companies in order to steal specific data. The majority of cyber criminals are indiscriminate; they target vulnerable computer systems regardless of whether the systems are part of a Fortune 500 company, a small business, or belong to a home user.

SMALL BUSINESS BREACHES Small businesses, which are making the leap to computerized systems and digital records, are attractive targets for hackers. Small businesses store significant amounts of sensitive data from customer information to intellectual property. While large businesses can dedicate resources to cybersecurity, small businesses face the same cybersecurity challenges and threats with limited resources, capacity, and personnel. In 2010, the U.S. Secret Service and Verizon Communications Inc.'s forensic analysis unit, which investigates attacks, responded to a combined 761 data breaches, up from 141 in Of those, 63 percent were at companies with 100 employees or fewer. Visa estimates about 95 percent of the credit-card data breaches it discovers are on its smallest business customers.

CYBER TIPS FOR YOUR BUSINESS Assess risk and identify weaknesses – If your sensitive information is linked to the Internet, then make sure you understand how it’s being protected. Create a contingency plan – Establish security practices and policies to protect your organization’s sensitive information and its employees, patrons, and stakeholders. Educate employees – Make sure that employees are routinely educated about new and emerging cyber threats and how to protect your organization’s data. Hold them accountable to the Internet security policies and procedures, and require that they use strong passwords and regularly change them. Back up critical information – Establish a schedule to perform critical data backups to ensure that critical data is not lost in the event of a cyber attack or natural disaster. Store all backups in remote locations away from the office, and encrypt sensitive data about the organization and its customers. Invest in data loss protection software and use two-factor authentication where possible. Secure your Internet connection – Use and regularly update antivirus software and antispyware on all computers. Automate patch deployments across your organization, use a firewall, encrypt data in transit, and hide your Wi-Fi network. Protect all pages on your public-facing websites. Create a continuity plan – A continuity plan ensures that of nature, accidents, and technological or attack-related emergencies. Business functions can continue to be performed during a wide range of emergencies, including localized acts templates for this type of plan at

DO YOUR PART As a business owner, you can earn customer loyalty by promoting the security practices that you have implemented to protect their data. The losses resulting from cyber crimes, which can severely damage a business’s reputation, often outweigh the costs associated with the implementation of a simple security program. By implementing a security program that involves both technical controls and cultural adjustments, small businesses can take a big step in fighting cyber crime.

CALL TO ACTION Cybersecurity is a shared responsibility that all Americans must embrace to keep the Nation secure. Become an advocate in your community to help us educate and empower the American public to take steps to protect themselves online. How to get involved: Become a Friend of the Campaign by visiting Make cybersecurity a priority. Discuss safe online practices with your fellow employees. Inform your community about the Stop.Think.Connect.™ Campaign and the resources available. Blog or post about the issue of cybersecurity and the Stop.Think.Connect. Campaign. Host a cybersecurity activity in your office. Download and distribute Stop.Think.Connect. materials, such as the brochure, bookmark, and poster, to your employees.

SECURING CYBERSPACE STARTS WITH YOU