![Page 1: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/1.jpg)
Louis L. Barton – Executive Vice President Director of Operational Risk Management
Certified Information Privacy Professional
A discussion of the threats and ideas for mitigation
Cyber Safety Starts With You Business
01-2017
![Page 2: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/2.jpg)
Agenda
DISCLAIMER The information herein has been obtained from sources believed reliable. While we do not doubt the accuracy of the information or its
sources, we have not verified them and make no guarantee, warranty or representation about them. It is your responsibility to independently confirm the accuracy and completeness of the information. You and your legal advisors should
conduct a careful, independent investigation of the information herein to determine to your satisfaction the suitability of the information for your needs.
Cyber Risks
Case Studies
Emerging Risks
Other Considerations
Panel Discussion
![Page 3: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/3.jpg)
Cyber Risks
![Page 4: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/4.jpg)
Consequences
Cyber Risks
Loss of funds Loss of data Reputation Physical safety Interruptions Legal issues
Five Risk Groups 1. Skimming 2. Wi-Fi 3. Malware 4. Social Engineering 5. Cyber Attacks
![Page 5: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/5.jpg)
Skimmers/Shimmers
![Page 6: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/6.jpg)
Skim and Shim
Skimmers on POS and ATMs
Captures data from the mag stripe.
The device can be bluetooth or WiFi enabled.
MITIGATION Check Statements Text Alerts
![Page 7: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/7.jpg)
Shimmer in an ATM
Captures data from the chip.
The device is inserted from the outside of the ATM and no access is required to the ATM internals.
MITIGATION Check Statements Text Alerts
Skim and Shim
![Page 8: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/8.jpg)
Skim and Shim
Easy to install
http://www.bankrate.com/financing/banking/watch-a-thief-install-a-skimmer-in-3-seconds/?ic_id=related_post
![Page 9: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/9.jpg)
Update from DEFCON (Hackers Conference)
Skim and Shim
Over 20,000 people were in attendance
![Page 10: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/10.jpg)
Can credit cards with CVVs that automatically change every hour kill off card fraud? Pilots are in progress to test this in France.
Card Fraud
![Page 11: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/11.jpg)
Wi-Fi
![Page 12: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/12.jpg)
It is easy for criminals to compromise internet routers and intercept Wi-Fi
Contact your provider to help configure your home or office router
The Response Home/Office Wi-fi
Wi-Fi
![Page 13: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/13.jpg)
Turn off auto connect Verify wi-fi before use Use a hotspot protector See mullvad.net for more ideas.
The Response Mobile wi-fi
It is easy for criminals to intercept mobile wi-fi
Wi-Fi
![Page 14: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/14.jpg)
Wi-Fi
PLACE HOLDER
Short VIDEO on dangers of Wi-Fi
![Page 15: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/15.jpg)
Malware
![Page 16: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/16.jpg)
Malware
Results in business interruptions and lost data
![Page 17: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/17.jpg)
Back up your data frequently. Don’t click attachments or links in emails.
Ransom Ware
It can lock you out of your computer or encrypt your data
The Response
Malware
![Page 18: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/18.jpg)
Insure your sensitive data is encrypted.
Ransom Ware
New Dilemma: “Pay up or we’ll breach your data and you’ll have to pay a HUGE fine!”
The Response
Malware
![Page 19: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/19.jpg)
RanSim simulates a ransomware attack, testing defenses against threat scenarios. When finished it will show what files would have been encrypted in a real attack.
Ransom Ware
Some prevention is now available
The Response
Malware
![Page 20: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/20.jpg)
Keyloggers
Capture your keystrokes and send them to the cyber criminal
The Response
Malware
Prevent by not clicking links or attachments in emails. Avoid rogue websites. Utilize antivirus.
![Page 21: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/21.jpg)
Prevent by not clicking links or attachments. Utilize antivirus.
Trojans
Malware can use macros in Microsoft Office to infect systems. Can gain access to the financial records of a user
The Response
Malware
![Page 22: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/22.jpg)
Phones/Tablets Apps can contain malware Get apps from trusted
sources, never from search engines. For Androids consider Sophos Mobile Security or Malwarebytes.
The Response
Malware
![Page 23: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/23.jpg)
Malware
PLACE HOLDER
Short VIDEO on dangers of apps
![Page 24: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/24.jpg)
Malware
700 Million Androids send Data To China
Over 700 Million Android smartphones contain a secret 'backdoor' that surreptitiously sends all
your text messages, call log, contact list, location history, and app data to China every 72 hours
![Page 25: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/25.jpg)
Has my phone been hacked?
Malware
97% of mobile malware is targeted at Android devices, according to a new report by Pulse Secure.
![Page 26: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/26.jpg)
Malware
What is the risk of clicking links or attachments on the internet?
Example
Knock on the door at 2:00 am.
What would you do?
![Page 27: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/27.jpg)
Social Engineering
![Page 28: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/28.jpg)
Social Engineering
Clicking anything in an email can install malware.
Example
![Page 29: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/29.jpg)
Social Engineering
CallerId
The caller information may not be accurate
Criminals can display any information they desire
Why it can be a risk Caller ID Spoofing: Don't Rely on Caller ID to Verify Who's Calling
![Page 30: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/30.jpg)
The media suggests that systems are tricked by hackers.
Social Engineering
The Media
People are tricked, not the systems.
The Real Story
![Page 31: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/31.jpg)
Social Engineering
Mitigation: have a process in place to verify payment requests.
Fraudster sends email posing as a CEO, creating a look-a-like email address
![Page 32: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/32.jpg)
Cyber Attacks
![Page 33: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/33.jpg)
Cyber Attacks
Mitigation Discuss with a trusted computing consultant or internet service provider.
Denial of Service Making a website unavailable to its users.
Accomplished by flooding a website with superfluous requests to overload systems.
![Page 34: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/34.jpg)
Cyber Attacks
Mitigation 1. Always avoid: • clicking on links • opening attachments in emails not expected 2. Beware of pop-ups 3. Protect your devices with a firewall, spam filters, anti-virus
Phishing The activity of defrauding you of financial information by posing as a legitimate company
![Page 35: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/35.jpg)
Cyber Attacks
Mitigation Keep software updated Use a reliable antivirus with built-in URL checker Use an ad blocker
Drive by Attack The website accessed from a search tool was hijacked and downloads malware to your computer.
![Page 36: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/36.jpg)
Cyber Attacks
Mitigation Common sense: Use firewalls Use good passwords Use antivirus Update software Train employees Protect paper records
Hacking Circumventing computer security.
![Page 37: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/37.jpg)
A resource: www.breachalarm.com
Have your passwords been hacked?
Cyber Attacks
![Page 38: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/38.jpg)
Case Studies
![Page 39: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/39.jpg)
A business receives email wire request for $135,000 from a fraudster pretending to be the CEO. New beneficiary info is given.
Case Studies
Cyber Heist
The business creates the wire and has it approved. No process in place to process payment requests.
The Response
![Page 40: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/40.jpg)
Cyber Heist The Response
Use a separate computer for banking. Avoid clicking on search results that can compromise you.
A business incurred a $345,000 loss after a BING search from their office pc
Google removes more than 10,000 malicious websites from its search results daily.
Case Studies
![Page 41: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/41.jpg)
A Missouri firm tried to recover $440,000 from its bank after a cyber heist.
Case Studies
The firm was offered dual controls by the bank. They made a decision in writing not to use dual controls.
Cyber Heist Who is liable?
![Page 42: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/42.jpg)
A California oil company lost $350,000 in a cyberheist.
Case Studies
The bank failed to offer commercially reasonable security. Customer was reimbursed.
Cyber Heist Who is liable?
![Page 43: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/43.jpg)
Emerging Risks
![Page 44: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/44.jpg)
Emerging Risks
Apple Pay Why it can be a risk
Not updating the iOS
A Jailbroken phone
Using apps not trusted
Not using lost mode
![Page 45: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/45.jpg)
Collect data from phones
Sen. Schumer submitted a letter to FTC to investigate to see if privacy violations are occurring. Stay current on “smart billboards”
Billboards Why it can be a risk
Emerging Risks
A camera on the billboard will look on the highway to identify vehicles and present a corresponding ad.
![Page 46: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/46.jpg)
Tracking Devices
Crime Blog: San Antonio resident says stalker dropped Tile tracker in purse
Why it can be a risk
Emerging Risks
![Page 47: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/47.jpg)
Other Considerations
![Page 48: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/48.jpg)
Other Considerations
Simple steps you can take to reduce cyber risks and fraud
Protecting yourself and your family
![Page 49: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/49.jpg)
Put a freeze on your credit report (and your children, elderly parents) Do ID Theft Services work?
Other Considerations
and your family
December 2016 Symantec, the leader in cyber-security and parent company of Norton, has acquired LifeLock.
UPDATE
![Page 50: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/50.jpg)
Never respond to text messages, email or phone requests (or click links) unless you initiated the transaction. Verify, then trust.
and your family
Other Considerations
![Page 51: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/51.jpg)
Protect devices and phones by: using firewalls, antivirus software, keep operating system up to date consult experts with questions
and your family
Other Considerations
![Page 52: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/52.jpg)
Other Considerations
![Page 53: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/53.jpg)
Other Considerations
The best anti-virus is:
Businesses should consult with a cyber professional
![Page 54: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/54.jpg)
sba.gov/cybersecurity
Resources
Other Considerations
Staying Up To Date
For consumers:
![Page 55: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/55.jpg)
Provide a secure website Provide text alerts for account activity Provide 2 factor authentication Confirm suspicious transactions Require training for employees Observe security regulations
How Banks Can Help Reduce Risk
Other Considerations
![Page 56: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/56.jpg)
Provide awareness seminars Provide fraud info on website Mobile Banking Apps Security Online Banking Security Profile Cyber liability insurance options Payment risk mitigation
How Banks Can Help Reduce Risk
Other Considerations
![Page 57: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/57.jpg)
Review your payment process Help improve controls Identify technical security issues Highlight the risk factors for fraud Review segregation of duties
How Consultants and CPAs Can Help
Panel Discussion
Q & A With The Panel Discussion
![Page 58: Cyber Safety Starts With You - StarChapter · A discussion of the threats and ideas for mitigation . Cyber Safety Starts With You . Business . 01-2017 . Agenda . DISCLAIMER ... now](https://reader036.vdocuments.site/reader036/viewer/2022070723/5f020cd27e708231d40253f0/html5/thumbnails/58.jpg)
Louis L. Barton – Executive Vice President Director of Operational Risk Management
Certified Information Privacy Professional
A discussion of the threats and ideas for mitigation
Cyber Safety Starts With You Business