have the time? steps to deal with cybercrime hftp annual conference bellevue, washington october 23,...

17
Have the Time? Have the Time? Steps to Deal with Steps to Deal with Cybercrime Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just Scott Perry)

Upload: jack-ross

Post on 18-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Have the Time?Have the Time?Steps to Deal with Steps to Deal with

CybercrimeCybercrime

HFTP Annual ConferenceBellevue, Washington

October 23, 2015

Presented by:John D. Daum, CPA

Scott Perry (Just Scott Perry)

Page 2: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Wake Up & Smell the Wake Up & Smell the CoffeeCoffee

True or FalseSeattle's annual rainfall is less than that of Houston, Chicago and New York City.

Page 3: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Wake Up & Smell the Wake Up & Smell the CoffeeCoffee

True!!!

Page 4: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Cost of Cost of CybercrimeCybercrime

The Center for Strategic & International Studies estimates that annual losses due to cybercrime on the global economy are:◦A conservative estimate would be

$375 billion.◦Maximum would be $575 billion.◦Even the smallest would be more than

the national income of most countries.

Page 5: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Cost of Cost of CybercrimeCybercrime

Costs include:◦Hundred of millions of people having

their identity stolen. 40 million in the U.S. 54 million in Turkey 20 million in each Korea & China 16 million in Germany

◦Damages company performance, competitiveness and innovation.

Page 6: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

How Bad Is It?How Bad Is It?

The U.S. Director of National Intelligence has ranked cybercrime as the top national security threat, higher than that of terrorism, espionage, and weapons of mass destruction.

Page 7: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Common Types of Common Types of CybercrimeCybercrimeTheft

◦ Copy right violations such as downloading music, games, etc.

Identity theftMalicious software

◦ Usually internet based software used to disrupt a network, steal sensitive information or cause damage to the present system

Hacking◦ Computer is broken into◦ Fraudulent financial transactions can occur◦ Also have sensitive information stolen

Page 8: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

How Does Cybercrime How Does Cybercrime StartStart

An infected document attached to an email

A link within an email that connects to an infected website

Employees visiting social networking websites and clicking on infected documents, videos, or photos posted there.

Transferring documents infected from another computer.

Page 9: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

An Ounce of PreventionAn Ounce of PreventionHow to protect financial assets

and sensitive information:◦Install and maintain real time anti-

virus and anti-spyware◦Install routers and firewalls◦Perform IT security evaluations◦Be wary if you unexpectedly receive

emails The IRS never emails!!!!!!!

Page 10: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

An Ounce of PreventionAn Ounce of PreventionHow to protect financial assets

and sensitive information (continued):◦Do not perform online banking

activities in public spaces◦Use electronic security tokens

If you ever receive a message, after entering your code, that the online banking is temporarily unavailable, notify your bank at once

Page 11: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

An Ounce of PreventionAn Ounce of PreventionHow to protect financial assets and

sensitive information (continued):◦Initiate wire and ACH files using dual

control One employee initiates transfer and

another user approves and releases using a different computer and ID

◦Dedicated computer(s) for banking No email other than banks No social media, etc.

◦Discuss options with banking institution(s)

Page 12: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Wake Up & Smell the Wake Up & Smell the CoffeeCoffeeWho is going to be installed as the

new HFTP Global President tonight?

A)Scott PerryB) Arlene RamirezC)John DaumD)Frank Wolfe

Page 13: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Wake Up & Smell the Wake Up & Smell the CoffeeCoffee

Arlene Ramirez

Page 14: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Cybercrime InsuranceCybercrime InsuranceWhat is generally covered:

◦Third-party loss resulting from a breach Employee or vendor information

compromised resulting in a loss Lawsuits

◦Direct first-party costs Cost of notifications (Required in 46 states) Public relations Forensic investigations Legal consultations Identity monitoring cost for victims

Page 15: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Cybercrime InsuranceCybercrime InsuranceWhat is generally covered (continued):

◦Business interruption resulting in lost revenue and additional operating expenses

◦Threats made by an outsider Extort money, securities, etc. Monies paid to end threat Cost of investigation

◦Liability due to content distributed on website Copyright, trademark, etc. infringement Defamation Invasion of privacy

Page 16: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Cybercrime InsuranceCybercrime InsuranceCybercrime insurance usually in itself

does not cover any actual lose of funds.

Computer Fraud Coverage will◦Protects if a thief uses a computer to steal

covered property from your property or bank to a person or place on the outside

◦ Covered property includes: Money Securities Credit card receipts Secret recipes

Page 17: Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just

Cybercrime InsuranceCybercrime InsuranceComputer Fraud Coverage does

not always clearly define what a “computer” is

If you have a Cybercrime policy check to make sure Computer Fraud Coverage is included◦Usually a separate endorsement◦Usually maximum of $250,000

Statistics show that 90% of fraudulent transfers are for less than $250,000.