erik nachbahr "dealership technology"

Post on 12-Jun-2015

133 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

DESCRIPTION

Dealership Technology

TRANSCRIPT

Erik Nachbahr

PresidentHelion Technologies

Dealership Technology

Pg. 35

Top Dealership Technology

Threats in 2013

About Helion / Erik Nachbahr

• 15 years working with Auto Dealers

• 80 IT Professionals, many with BS and MS Computer Science degrees and advanced industry certifications

• 530+ Dealerships supported with 17,000+ computers

Top Real-Time Dealer Threats

•Federal Trade Commission Action

•Business Software Alliance Lawsuits

•Theft of Customer Information / Data Loss

Downtime and Lost Productivity

Legal / Financial Liability

Threats to Reputation

• The Dealership who’s customer data was stolen

• Dealership it not trustworthy

• Negative media coverage

Threats to Profitability

• Compromised systems / Systems down

• Stolen customer lists and personal information

• Bank Account Theft

FTC Action Against Dealers

• Based on Dealer’s lack of protection of customer data

• Dealers are financial institutions

• Dealers are extremely vulnerable to attack

P2P Software Threat

• Typically used to share copyrighted music, videos and files

• Installed by an employee on their PC

• Automatically shares some or all of the computer’s files to the Internet

• Legal liability and security risk but low on the list of threats

What do you risk?

• Bad publicity

• Theft of customer records

• Shut down by FTC

• Business disruption from failed computer systems

What is broken in Dealerships?

• Zero security on local computers

• No Central Control of systems

• Open Wireless

• DLP (Data Loss Prevention) applications not in use

What about

• Security Risk without proper Wi-Fi protections

• Productivity Drain potential

• Early-Adopter risk here

FTC Action Item # 1: Active Directory

• Deploy Windows Server Solution

• LOCK DOWN PCs

• Control Internet / network use by employee

FTC Action Item # 2: Wireless Control

• Update and Lock down wireless with WPA2 Encryption

• Install a User-based Security or Firewall for Wireless

• Separate Customer wireless from corporate wireless

FTC Action Item # 3: Protection Systems

• Managed Computer security Patching

• Managed Antivirus Systems

FTC Action Item # 4: Policy

• Have a computer acceptable use policy

• All employees must execute and understand it

• Sample at:

www.heliontechnologies.com/policy/use-sample

Software Piracy

• 2010 US Piracy losses: $9.5 Billion

• 2010 US Piracy Rate: 20%

• 2013 Estimated Global Commercial Value of Pirated Software: $63.4 Billion

• Tremendous incentive to prevent piracy

Who enforces anti-piracy laws?

BSA (Business Software Alliance)

Represents Microsoft, Apple, Adobe and others

Has paid over $453,455 since 2008 in rewards to confidential informants

What is the BSA’s Authority?

Not a law enforcement agency.

Uses civil litigation and copyright law.

Pays “tipster rewards” of up to $200,000

Piracy Warning Signs

Microsoft Office 2003 or earlier in use

Custom Build / Home Built / “White Box” PCs

Internal IT Departments

Purchasing software licenses from the Internet

BSA Process

1. BSA Alleges piracy, demands self audit

2. Dealer performs self audit. Must provide invoices for all software installed

3. BSA presents Dealer with demand (typically $3,000 x copies of software unlicensed)

BSA Action Item : Perform Self License AssessmentLook for piracy warning signs

Document all software running on all computers including invoices for all

Remove or purchase any software without proper proof of purchase

Contact Information

Erik Nachbahr

enachbahr@heliontechnologies.com

Direct 443-610-7640

top related