protecting your organization identity theft and data breach

14
Protecting Your Organization Identity Theft and Data Breach

Upload: gervase-gibbs

Post on 20-Jan-2016

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Protecting Your Organization Identity Theft and Data Breach

Protecting Your Organization

Identity Theft and Data Breach

Page 2: Protecting Your Organization Identity Theft and Data Breach

What is business identity theft?

Page 3: Protecting Your Organization Identity Theft and Data Breach

Consequences

• Financial loss

• Damaged credit

• Damaged name/reputation

• Closure of business

Page 4: Protecting Your Organization Identity Theft and Data Breach

Vulnerabilities

• Phishing & Spoofing– employees– customers

• Internet profiling– state filing– website– social media– credit report

• Account hijacking– Social media– financial

Page 5: Protecting Your Organization Identity Theft and Data Breach

Warning Signs

• Statement discrepancy

• Notifications

• Collection calls

• Customer complaints (unknown)

Page 6: Protecting Your Organization Identity Theft and Data Breach

Reducing the Risk

• Monitoring– State filing– Financial– Credit report– IP– Google alerts

• Online accounts– Financial– Social media

Page 7: Protecting Your Organization Identity Theft and Data Breach

Laws

• Florida HB 157– Business identity theft a crime– Restoration rights– Strengthen charges– False public record = criminal charge– Medical ID theft = felony

Page 8: Protecting Your Organization Identity Theft and Data Breach

What is a data breach?

Page 9: Protecting Your Organization Identity Theft and Data Breach

Consequences

• Customer churn

• Fines and penalties

• Class action lawsuit

• Tarnished reputation

Page 10: Protecting Your Organization Identity Theft and Data Breach

Vulnerabilities

• Employees

• Partners

• Clients/Customers

• Technology

Page 11: Protecting Your Organization Identity Theft and Data Breach

Warning Signs

• Malware

• Client notification

• Theft

• Hijacked

Page 12: Protecting Your Organization Identity Theft and Data Breach

Reducing the Risk

• Risk assessment– Data matrix– Data life cycle– Laws & compliance

• Policies & Procedures

• Employee Training

• Repeat

Page 13: Protecting Your Organization Identity Theft and Data Breach

Review

• Business Identity Theft– HB 157– Monitor– Employee training

• Data Breach– Employees weakest link– Risk assessment– Policies & procedures– Employee training– Continuous

Page 14: Protecting Your Organization Identity Theft and Data Breach

Resources

• Kerskie Group, Inc(239) [email protected] www.Kerskie.comTwitter @CarrieKerskie**Email me to request a copy of the data

privacy steps

• Hodges University (new)– Identity Theft Research & Education Center