friday, october 23, 2015. jacqueline harris, cpm®, ccim® director of training & administration...

21
Cyber Attacks and Hacking: What You Need to Know About Data Privacy and Security Friday, October 23, 2015

Upload: dale-webb

Post on 18-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Cyber Attacks and Hacking: What You Need to Know About Data Privacy and SecurityFriday, October 23, 2015

Page 2: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Jacqueline Harris, CPM®, CCIM®Director of Training & AdministrationDigital Realty

Kevin BodellSystems and Infrastructure ManagerCity Creek Reserve, Inc.

Smart Chick Megan OrserSmart Apartment Solutions

Page 3: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

BREAKING NEWS….CIA “HACKED”?

TUESDAY, OCTOBER 20, 2015

Page 4: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

“It’s no longer a matter of if a company gets hacked, it’s only a matter of when.”

Mark Stamford, OCCAMSEC

Page 5: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Symantec found that 17 percent of all android apps were actually malware in

disguise.

Ransomware attacks grew 113 percent in 2014, along

with 45 times more crypto-ransomware

attacks.

2014 2013

168127

New Mobile Vulnerabilities

2014 2013

24000

11000

Ransomware Total

2015 INTERNET SECURITY THREAT REPORT, Symantec

Page 6: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Who is getting hacked.

Small BusinessA recent infographic by Towergate Insurance said that last year, 97

percent of smaller businesses neglected to prioritize online security improvement for future business growth.

VS

Page 7: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

It’s not IF,It’s

WHEN!

Page 8: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Today’s Cyber Attacks

Social EngineeringPhishingHackingRansomware

Page 9: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

What is Social Engineering?A non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures

Social engineering is one of the most effective ways to circumvent established security protocol

Targets human “vulnerabilities” (helpfulness, fear, insecurity)

Page 10: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

10

Page 11: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

“Hacking” what’s at risk for Property Managers?

Building Management SystemsEnergy Management SystemsEmergency Notification SystemsCustomer PortalsIntegrated Work Management SystemsPoor Password ProtectionUnmonitored Access PointsRudimentary Software

Page 12: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

RansomwareMidsize BusinessesThe most common causes were malicious or criminal attacks (44 percent), followed by employee negligence (31 percent) and system glitches (25 percent).

The intent of the breach is usually information theft leading to financial gain, rather than so-called hacktivism,

Page 13: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

What is your exposure?

Resident/Employees FilesSocial Security NumberDrivers LicenseMajor Credit CardsCredit ReportAddress HistoryEmployment HistoryBusiness Reputation

Page 14: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Prevent

•What is the risk?

•What is your exposure?

Prepare

•What can you do to prepare for the inevitable?

•What practical approaches can you take to minimize exposure?

Respond

•How do you minimize the impact to business as usual when it does happen?

•How do you mitigate risk once it’s happened?

Page 15: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Data Classification

Level 1 Level 2 Level 3 Level 4

Data that may be freely disclosed with the public.

Internal data that is not meant for

public disclosure.

Sensitive internal data that if

disclosed could negatively affect

operations.

Highly sensitive corporate and customer data that if disclosed could put the

organization at financial or legal risk.

Example: Contact information, price

lists

Example: Sales contest rules, organizational

charts

Example: Contracts with third-party

suppliers, employee reviews

Example: Employee social security numbers,

customer credit card numbers

Prevent Prepare

Respond

Page 16: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Network & Physical Security Controls

Network, Computer, and Email Access ControlsEncryptionAnti-Virus/Anti-SpywareFirewall and Internet Connection

Prevent Prepare Respond

Page 17: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

General Security Controls

Visitor PolicySocial EngineeringThird party network security checksNetwork and Computer Backups

Prevent Prepare Respond

Page 18: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

“I’ve been hacked...”

Prevent Prepare Respond

Page 19: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Respond CONSIDER THE NUMBERSAverage Organizational Cost of a Data Breach $5.9 millionEstimated Cost of a General Data Breach $201 per compromised record

• Identify source & stabilize• Notify impacted parties• Be detailed, consistent & diligent with your reporting• Review business loss insurance• Develop plan to protect the company brand• Commence “Customer Loyalty” activities• Implement protocols to prevent future breaches• Be ready to adjust & adapt quickly as new threats arise

Prevent Prepare Respond

Page 20: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

Future Predictions

New forms of blackmailing & extortion schemesRansom ware for data theftSmart MachinesSmart Offices or Business BMS SystemsIncreased threats at the power source (public utilities, old/outdated infrastructure, banking systems, financial institutions)

Are you and your organization protected ?

Prevent Prepare Respond

Page 21: Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director

IREM Resources…

“Are You Sitting on a Cyber Security Bombshell?”, Joseph Dobrian, JPM Sept/Oct 2015Before and After Disaster Strikes: Developing An Emergency Procedures Manual, 4th Edition, ©2012 IREM“What You Should Know About Cybersecurity Insurance,” © IREM Blog October 15, 2015