erik nachbahr "dealership technology"
DESCRIPTION
Dealership TechnologyTRANSCRIPT
Erik Nachbahr
PresidentHelion Technologies
Dealership Technology
Pg. 35
Top Dealership Technology
Threats in 2013
About Helion / Erik Nachbahr
• 15 years working with Auto Dealers
• 80 IT Professionals, many with BS and MS Computer Science degrees and advanced industry certifications
• 530+ Dealerships supported with 17,000+ computers
Top Real-Time Dealer Threats
•Federal Trade Commission Action
•Business Software Alliance Lawsuits
•Theft of Customer Information / Data Loss
Downtime and Lost Productivity
Legal / Financial Liability
Threats to Reputation
• The Dealership who’s customer data was stolen
• Dealership it not trustworthy
• Negative media coverage
Threats to Profitability
• Compromised systems / Systems down
• Stolen customer lists and personal information
• Bank Account Theft
FTC Action Against Dealers
• Based on Dealer’s lack of protection of customer data
• Dealers are financial institutions
• Dealers are extremely vulnerable to attack
P2P Software Threat
• Typically used to share copyrighted music, videos and files
• Installed by an employee on their PC
• Automatically shares some or all of the computer’s files to the Internet
• Legal liability and security risk but low on the list of threats
What do you risk?
• Bad publicity
• Theft of customer records
• Shut down by FTC
• Business disruption from failed computer systems
What is broken in Dealerships?
• Zero security on local computers
• No Central Control of systems
• Open Wireless
• DLP (Data Loss Prevention) applications not in use
What about
• Security Risk without proper Wi-Fi protections
• Productivity Drain potential
• Early-Adopter risk here
FTC Action Item # 1: Active Directory
• Deploy Windows Server Solution
• LOCK DOWN PCs
• Control Internet / network use by employee
FTC Action Item # 2: Wireless Control
• Update and Lock down wireless with WPA2 Encryption
• Install a User-based Security or Firewall for Wireless
• Separate Customer wireless from corporate wireless
FTC Action Item # 3: Protection Systems
• Managed Computer security Patching
• Managed Antivirus Systems
FTC Action Item # 4: Policy
• Have a computer acceptable use policy
• All employees must execute and understand it
• Sample at:
www.heliontechnologies.com/policy/use-sample
Software Piracy
• 2010 US Piracy losses: $9.5 Billion
• 2010 US Piracy Rate: 20%
• 2013 Estimated Global Commercial Value of Pirated Software: $63.4 Billion
• Tremendous incentive to prevent piracy
Who enforces anti-piracy laws?
BSA (Business Software Alliance)
Represents Microsoft, Apple, Adobe and others
Has paid over $453,455 since 2008 in rewards to confidential informants
What is the BSA’s Authority?
Not a law enforcement agency.
Uses civil litigation and copyright law.
Pays “tipster rewards” of up to $200,000
Piracy Warning Signs
Microsoft Office 2003 or earlier in use
Custom Build / Home Built / “White Box” PCs
Internal IT Departments
Purchasing software licenses from the Internet
BSA Process
1. BSA Alleges piracy, demands self audit
2. Dealer performs self audit. Must provide invoices for all software installed
3. BSA presents Dealer with demand (typically $3,000 x copies of software unlicensed)
BSA Action Item : Perform Self License AssessmentLook for piracy warning signs
Document all software running on all computers including invoices for all
Remove or purchase any software without proper proof of purchase