SlideShare una empresa de Scribd logo
1 de 32
WELCOME TO:
CYBER SECURITYAND THE IMPACT ON YOUR
BUSINESS
HOW DO YOU CURRENTLY
BACK UP YOUR DATA?
ADD YOUR RESPONSE AT WWW.SLI.DO
JOIN USING THIS CODE:
#5660
WHO WE ARE
"Our mission is to make IT simple. Enabling our customers
to succeed by delivering information technology services
better than anyone else."
CYBER SCAMS
What were the most prevalent cyber
scams of 2016?
How much damage did they cause?
Common frauds & scams in today’s
digital marketplace
• Phishing
• Vishing
• Invoice Redirection
• Bogus Boss
• Overpayment Fraud
PHISHING
Bogus emails which appear authentic and from legitimate sources
• High volume
• Fake links, websites, attachments
Tips to protect
• Antivirus, Trusteer Rapport, spam filters and firewalls
• Https://
• Do not respond
• Do not click links
• Forward suspect emails to: phishing@natwest.com
VISHING
Voice + Phishing = Vishing
• Social engineering
• Information jigsaws
Tips to protect
• Question who is calling
• Decline to provide personal information
• Do not rely on Caller ID
• Do not transfer money
INVOICE REDIRECTION
Specifically aimed at businesses
They research your business
• Suppliers’ details
• Payment profile
They attempt to issue a revised payment location controlled by fraudsters.
Tips to protect
• May begin with post going missing
• Validate any requests
• Dual-authorise changes
• Systems, processes and checks
CASE STUDY
BOGUS BOSS
• Email or text reportedly from your ‘boss’
• Requests an urgent transfer of funds due to a situation or in a light-
hearted conversation
• Fakes/spoofs internal email appearances
Tips to protect
• Question the request
• Validate the request
• Speak to the person
OVERPAYMENT FRAUD
• Customer advises they have ‘mistakenly’ overpaid your bill e.g.
£40,000 instead of £4,000
• Requests you keep the amount and return the difference
• Original payment subsequently bounces
Tips to protect
• Typically new clients
• Do usual background and reference checks
• Think about how you would treat a cheque
• Strange type of payment - validate
REMEMBER
• Do not share user accounts
• Install Trusteer Rapport software
• Have up to date antivirus
• Never give out your pin/password
Useful contacts
Email: phishing@natwest.com
NatWest Fraud: 0345 300 3986
Actionfraud: 0300 123 2040
CRYPTOLOCKER
A type of Ransomware that stealthily encrypts all your files and deletes the originals,
before demanding payment to reinstate your documents and data. Typically delivered
via email or an insecure internet-enabled computer.
In 2016, 54% of UK businesses were hit by some form of
Ransomware attack
CRYPTOLOCKER
HOW RANSOMWARE CAN IMPACT YOUR BUSINESS
IF YOU GET IT RIGHT…
Hotel in Belfast
Employees: ~500
Type of Backup: untested, internally managed
What happened: AAG brought in when
Cryptolocker hit for the 3rd time in 2 weeks
Response: Engineer deployed within 4 hours
Recovery time: <48 hours for all systems; no
downtime to booking or critical systems
Cost to business: £negligible
IF YOU GET IT WRONG…
Company in Rotherham
Employees: 149
Type of Backup: untested, externally managed
What happened: Cryptolocker got onto their
network via an infected email
Recovery time: 14 days for critical systems
Last viable Backup: May 2016 (lost five months’
worth of data)
Cost to business: £35,000 lost revenue
WHY SHOULD I BACK UP?
• 6.2 million cyber attacks on UK businesses took place in 2015
• 33% of attacks were caused by an employee
• 3,200% - the increase in attack infrastructure used by cybercriminals in 2016
• 80% of CIOs and IT Directors surveyed had experienced a cyber attack
• 37% lost revenue
• 20% had to halt operations*
*540 individuals surveyed by Malwarebytes, 2016
WHY SHOULD I BACK UP?
The typical cost to SMEs
of a cyber attack
(PWC IOC Report, 2015)
70%
70% of businesses who
suffer a major data loss fail
within one year
(PWC IOC Report, 2015)
75%
75% of businesses fail to
successfully execute an
untested Disaster Recovery plan
(PWC IOC Report, 2015)
£75k -
£311k
HOW SHOULD I BACK UP?
How do you back up?
Let’s have a look at the results
Popular + unreliable Less popular + more
reliable
Becoming popular +
most reliable
Optical Drive Disk-to-Disk Site-to-Site Backup
Tapes Cloud
USB Hard Drive Site-to-Site + Cloud
How often do you test your Backup method?
HOW SHOULD I BACK UP?
Cloud vs. Site-to-Site vs. Disk
The recommended Backup method is always down to your business
needs. Typically, Cloud and/or Site-to-Site Backup gives the best value
and peace of mind
Capacity Security Reliability
Cloud Unlimited Very secure 99.99% uptime
Site-to-Site Flexible Secure More reliable
Disk/USB Hard Drive Limited Easily corruptible Less reliable
Tape Limited Easily corruptible Unreliable
COST OF SECURING YOUR DATA
ANNUAL MONTHLY REVENUE
(21 WORKING DAYS)
£1 MILLION £82,677
£3 MILLION £248,031
£5 MILLION £413,385
£10 MILLION £826,770
CLOUD COST
(DATA-DEPENDENT)
£150
£250
£350
£500
% OF TURNOVER
0.007%
0.001%
0.0008%
0.0006%
ANNUAL COST OF 12 DAYS’ LOST BUSINESS
£1 MILLION £47,244
£3 MILLION £141,732
£5 MILLION £236,220
£10 MILLION £472,440 *based on 254 working days per year
BACKUP & DISASTER RECOVERY
Backup refers to the copying and archiving of computer data so
it may be used to restore the original after a data loss event.
Backup is different to Disaster Recovery:
• Backup is simply making one or more copies of your data in
case the original is lost or damaged
• Disaster Recovery is restoring that data in the instance that
the original is lost or damaged.
Backup, Disaster Recovery
and Cyber Security
LEGAL ISSUES
INTRODUCTION
• Shulmans LLP
• One of the fastest growing Commercial law firms in the UK
• Providing a national service from a cost effective base in Leeds
• Experienced team with a focus on compliance, risk management,
technology and good business practice
• Risk and Regulation
• Strategy and Risk Management
• Business Process Advice
• Crisis Management and Regulator Response
mlumley@shulmans.co.uk hgoldthorpe@shulmans.co.uk
CHANGING LANDSCAPE
• Increasingly connected world
• Obsolete or vulnerable technology
• Increasingly complex attacks
• Rise of the Super-Regulator
• ICO
• National Cyber Security Centre (or similar)
• HSE
• Sector-specific regulation e.g. Financial Services
RISK
What risks are we trying to avoid?
• Injury
• Financial Loss
• Reputational Damage
• IP & Confidential Information Loss
• Regulatory Intervention/fines
• Liability to third parties
• Interference with operation/production
• Maintaining services/data availability
REGULATION
• Any interruption to business could expose you to claims e.g. that you are
unable to carry out contracted services
• ALWAYS good business sense to protect against this risk
• In some sectors there are also specific obligations to put security in place:
• Personal Data
• Cyber Security Directive
• Financial Services
• Payment card information
PERSONAL DATA PROTECTION
• Specific regulation relating to personal data
• Currently Data Protection Act 1998
• General Data Protection Regulation in force 2018
• Both contain obligations to have appropriate security measures
“…the controller [and the processor] shall implement appropriate technical
and organisational measures to ensure a level of security appropriate to the
risk…”
• Stronger obligations for sensitive personal data
• Stronger notification requirements in GDPR
CYBER SECURITY DIRECTIVE
• Will take effect in UK by May 2018
• Impacts on operators of essential services and digital service providers
• Online marketplace, online search engine, cloud computing service
• NOT hardware manufacturers/software developers/micro or small enterprises
• Security requirements
“appropriate and proportionate organisational risk management measures including measures to prevent and
minimise the impact of incidents that affect security of networks and information systems”
• Incident notification
• Will require
• Risk management systems
• Reporting processes
• Enforcement - fines?
INCIDENT RESPONSE
• Legal obligations don’t just cover putting technical protection in
place
• Also cover how you respond to an incident – containment, recovery,
notification
• Disasters do happen – need to plan ahead
• Legal priorities
• Regulatory notification obligations
• Contractual notification obligations
• Potential liability to third parties
• Are you able to pursue the perpetrator (especially for employee fraud) or
recover money/IP/assets?
• Legal privilege
• Plan ahead so you can act fast!
DIRECTORS’ LIABILITY
• s61 DPA
• Directors’ duties
• Regulatory obligations
• ICO may request undertakings from directors
CASE STUDY: EMPLOYMENT FRAUD
• Apparently loyal employees
• Handed in notice, off sick
• No apparent warning signs
• But…
• Copied emails to home address
• Used FTP File transfer software to transfer large files – difficult to detect
• Software, designs, clients, suppliers and pricing all copied
• Loss?
• What did we do?
WHAT NEXT?
• I’m too busy!
• Schedule time to review risks and strategy
• Understand your risk profile
• Formulate an action plan
• Fit into your “business year”
• Who needs to be involved?
• Board, key managers, staff, consultants, key suppliers
• Lawyers and specialist consultants
OUR SOLUTION
• Data Protect Workshop with AAG and Shulmans
• A planned, time & cost controlled solution
• Intro to other key business participants - high level summary of law and approach to risk assessment
• Scoping questionnaire
• Workshop:
• legal and technical
• individual business needs
• Board, management & operational
• Outputs – technical requirements, risk analysis & risk register, business knowledge, policies,
procedures, training materials.
• Outputs - data protection policies, customer document and online policies, business continuity policy
update, disaster recovery, cyber Incident response & cyber risk training. Delivered in physical and
digital formats
• Outputs - high level summary for board, compliance protection & insurers/brokers
• Layered approach to information, role specific (board, management and operational)
• Annual review and access to ongoing technical and legal support.
• Available dates
SUMMARY
• If your business is important to you, it is worth protecting it with a Backup &
Disaster Recovery strategy that you can have confidence in
• Educate your staff of the latest cyber scams and types of Ransomware attacks
• Test your current Backup
• Review your Disaster Recovery plan
• Implement a responsibilities chart
• Book your Data Protect Workshop with AAG and Shulmans
sales@aagsystems.co.uk www.linkedin.com/company/aagsystems 0114 399 0995

Más contenido relacionado

La actualidad más candente

Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWithum
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWithum
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseJason Luttrell, CISSP, CISM
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityPECB
 
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Citrin Cooperman
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Citrin Cooperman
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsE Radar
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your BusinessAll Covered
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesAll Covered
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebSurfWatch Labs
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Dan Michaluk
 
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...Raj Goel
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Citrin Cooperman
 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Crafted
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesCitrin Cooperman
 

La actualidad más candente (20)

Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST Compliance
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEs
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services Companies
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 

Destacado

Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Fakrul Alam
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Destacado (20)

Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar a Cyber Security and the Impact on your Business

Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR complianceSalim Benadel
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...Brian Miller, Solicitor
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWithum
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterPeter Jones
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy clubGet up to Speed
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxJkYt1
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 

Similar a Cyber Security and the Impact on your Business (20)

CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR compliance
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
 
DCNCBC
DCNCBCDCNCBC
DCNCBC
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptx
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 

Último

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 

Último (20)

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 

Cyber Security and the Impact on your Business

  • 1. WELCOME TO: CYBER SECURITYAND THE IMPACT ON YOUR BUSINESS HOW DO YOU CURRENTLY BACK UP YOUR DATA? ADD YOUR RESPONSE AT WWW.SLI.DO JOIN USING THIS CODE: #5660
  • 2. WHO WE ARE "Our mission is to make IT simple. Enabling our customers to succeed by delivering information technology services better than anyone else."
  • 3. CYBER SCAMS What were the most prevalent cyber scams of 2016? How much damage did they cause?
  • 4. Common frauds & scams in today’s digital marketplace • Phishing • Vishing • Invoice Redirection • Bogus Boss • Overpayment Fraud
  • 5. PHISHING Bogus emails which appear authentic and from legitimate sources • High volume • Fake links, websites, attachments Tips to protect • Antivirus, Trusteer Rapport, spam filters and firewalls • Https:// • Do not respond • Do not click links • Forward suspect emails to: phishing@natwest.com
  • 6. VISHING Voice + Phishing = Vishing • Social engineering • Information jigsaws Tips to protect • Question who is calling • Decline to provide personal information • Do not rely on Caller ID • Do not transfer money
  • 7. INVOICE REDIRECTION Specifically aimed at businesses They research your business • Suppliers’ details • Payment profile They attempt to issue a revised payment location controlled by fraudsters. Tips to protect • May begin with post going missing • Validate any requests • Dual-authorise changes • Systems, processes and checks
  • 9. BOGUS BOSS • Email or text reportedly from your ‘boss’ • Requests an urgent transfer of funds due to a situation or in a light- hearted conversation • Fakes/spoofs internal email appearances Tips to protect • Question the request • Validate the request • Speak to the person
  • 10. OVERPAYMENT FRAUD • Customer advises they have ‘mistakenly’ overpaid your bill e.g. £40,000 instead of £4,000 • Requests you keep the amount and return the difference • Original payment subsequently bounces Tips to protect • Typically new clients • Do usual background and reference checks • Think about how you would treat a cheque • Strange type of payment - validate
  • 11. REMEMBER • Do not share user accounts • Install Trusteer Rapport software • Have up to date antivirus • Never give out your pin/password Useful contacts Email: phishing@natwest.com NatWest Fraud: 0345 300 3986 Actionfraud: 0300 123 2040
  • 12. CRYPTOLOCKER A type of Ransomware that stealthily encrypts all your files and deletes the originals, before demanding payment to reinstate your documents and data. Typically delivered via email or an insecure internet-enabled computer. In 2016, 54% of UK businesses were hit by some form of Ransomware attack
  • 13. CRYPTOLOCKER HOW RANSOMWARE CAN IMPACT YOUR BUSINESS IF YOU GET IT RIGHT… Hotel in Belfast Employees: ~500 Type of Backup: untested, internally managed What happened: AAG brought in when Cryptolocker hit for the 3rd time in 2 weeks Response: Engineer deployed within 4 hours Recovery time: <48 hours for all systems; no downtime to booking or critical systems Cost to business: £negligible IF YOU GET IT WRONG… Company in Rotherham Employees: 149 Type of Backup: untested, externally managed What happened: Cryptolocker got onto their network via an infected email Recovery time: 14 days for critical systems Last viable Backup: May 2016 (lost five months’ worth of data) Cost to business: £35,000 lost revenue
  • 14. WHY SHOULD I BACK UP? • 6.2 million cyber attacks on UK businesses took place in 2015 • 33% of attacks were caused by an employee • 3,200% - the increase in attack infrastructure used by cybercriminals in 2016 • 80% of CIOs and IT Directors surveyed had experienced a cyber attack • 37% lost revenue • 20% had to halt operations* *540 individuals surveyed by Malwarebytes, 2016
  • 15. WHY SHOULD I BACK UP? The typical cost to SMEs of a cyber attack (PWC IOC Report, 2015) 70% 70% of businesses who suffer a major data loss fail within one year (PWC IOC Report, 2015) 75% 75% of businesses fail to successfully execute an untested Disaster Recovery plan (PWC IOC Report, 2015) £75k - £311k
  • 16. HOW SHOULD I BACK UP? How do you back up? Let’s have a look at the results Popular + unreliable Less popular + more reliable Becoming popular + most reliable Optical Drive Disk-to-Disk Site-to-Site Backup Tapes Cloud USB Hard Drive Site-to-Site + Cloud How often do you test your Backup method?
  • 17. HOW SHOULD I BACK UP? Cloud vs. Site-to-Site vs. Disk The recommended Backup method is always down to your business needs. Typically, Cloud and/or Site-to-Site Backup gives the best value and peace of mind Capacity Security Reliability Cloud Unlimited Very secure 99.99% uptime Site-to-Site Flexible Secure More reliable Disk/USB Hard Drive Limited Easily corruptible Less reliable Tape Limited Easily corruptible Unreliable
  • 18. COST OF SECURING YOUR DATA ANNUAL MONTHLY REVENUE (21 WORKING DAYS) £1 MILLION £82,677 £3 MILLION £248,031 £5 MILLION £413,385 £10 MILLION £826,770 CLOUD COST (DATA-DEPENDENT) £150 £250 £350 £500 % OF TURNOVER 0.007% 0.001% 0.0008% 0.0006% ANNUAL COST OF 12 DAYS’ LOST BUSINESS £1 MILLION £47,244 £3 MILLION £141,732 £5 MILLION £236,220 £10 MILLION £472,440 *based on 254 working days per year
  • 19. BACKUP & DISASTER RECOVERY Backup refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. Backup is different to Disaster Recovery: • Backup is simply making one or more copies of your data in case the original is lost or damaged • Disaster Recovery is restoring that data in the instance that the original is lost or damaged.
  • 20. Backup, Disaster Recovery and Cyber Security LEGAL ISSUES
  • 21. INTRODUCTION • Shulmans LLP • One of the fastest growing Commercial law firms in the UK • Providing a national service from a cost effective base in Leeds • Experienced team with a focus on compliance, risk management, technology and good business practice • Risk and Regulation • Strategy and Risk Management • Business Process Advice • Crisis Management and Regulator Response mlumley@shulmans.co.uk hgoldthorpe@shulmans.co.uk
  • 22. CHANGING LANDSCAPE • Increasingly connected world • Obsolete or vulnerable technology • Increasingly complex attacks • Rise of the Super-Regulator • ICO • National Cyber Security Centre (or similar) • HSE • Sector-specific regulation e.g. Financial Services
  • 23. RISK What risks are we trying to avoid? • Injury • Financial Loss • Reputational Damage • IP & Confidential Information Loss • Regulatory Intervention/fines • Liability to third parties • Interference with operation/production • Maintaining services/data availability
  • 24. REGULATION • Any interruption to business could expose you to claims e.g. that you are unable to carry out contracted services • ALWAYS good business sense to protect against this risk • In some sectors there are also specific obligations to put security in place: • Personal Data • Cyber Security Directive • Financial Services • Payment card information
  • 25. PERSONAL DATA PROTECTION • Specific regulation relating to personal data • Currently Data Protection Act 1998 • General Data Protection Regulation in force 2018 • Both contain obligations to have appropriate security measures “…the controller [and the processor] shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk…” • Stronger obligations for sensitive personal data • Stronger notification requirements in GDPR
  • 26. CYBER SECURITY DIRECTIVE • Will take effect in UK by May 2018 • Impacts on operators of essential services and digital service providers • Online marketplace, online search engine, cloud computing service • NOT hardware manufacturers/software developers/micro or small enterprises • Security requirements “appropriate and proportionate organisational risk management measures including measures to prevent and minimise the impact of incidents that affect security of networks and information systems” • Incident notification • Will require • Risk management systems • Reporting processes • Enforcement - fines?
  • 27. INCIDENT RESPONSE • Legal obligations don’t just cover putting technical protection in place • Also cover how you respond to an incident – containment, recovery, notification • Disasters do happen – need to plan ahead • Legal priorities • Regulatory notification obligations • Contractual notification obligations • Potential liability to third parties • Are you able to pursue the perpetrator (especially for employee fraud) or recover money/IP/assets? • Legal privilege • Plan ahead so you can act fast!
  • 28. DIRECTORS’ LIABILITY • s61 DPA • Directors’ duties • Regulatory obligations • ICO may request undertakings from directors
  • 29. CASE STUDY: EMPLOYMENT FRAUD • Apparently loyal employees • Handed in notice, off sick • No apparent warning signs • But… • Copied emails to home address • Used FTP File transfer software to transfer large files – difficult to detect • Software, designs, clients, suppliers and pricing all copied • Loss? • What did we do?
  • 30. WHAT NEXT? • I’m too busy! • Schedule time to review risks and strategy • Understand your risk profile • Formulate an action plan • Fit into your “business year” • Who needs to be involved? • Board, key managers, staff, consultants, key suppliers • Lawyers and specialist consultants
  • 31. OUR SOLUTION • Data Protect Workshop with AAG and Shulmans • A planned, time & cost controlled solution • Intro to other key business participants - high level summary of law and approach to risk assessment • Scoping questionnaire • Workshop: • legal and technical • individual business needs • Board, management & operational • Outputs – technical requirements, risk analysis & risk register, business knowledge, policies, procedures, training materials. • Outputs - data protection policies, customer document and online policies, business continuity policy update, disaster recovery, cyber Incident response & cyber risk training. Delivered in physical and digital formats • Outputs - high level summary for board, compliance protection & insurers/brokers • Layered approach to information, role specific (board, management and operational) • Annual review and access to ongoing technical and legal support. • Available dates
  • 32. SUMMARY • If your business is important to you, it is worth protecting it with a Backup & Disaster Recovery strategy that you can have confidence in • Educate your staff of the latest cyber scams and types of Ransomware attacks • Test your current Backup • Review your Disaster Recovery plan • Implement a responsibilities chart • Book your Data Protect Workshop with AAG and Shulmans sales@aagsystems.co.uk www.linkedin.com/company/aagsystems 0114 399 0995

Notas del editor

  1. Fraud is huge! Over 50% of all crimes reported in the latest ONS survey are fraud related – this includes traditional fraud Cyber fraud continues to rise – at least the bits that get reported (the only part that can be measured) Cybercrime –is Estimated to cost the UK economy up to £27bn per annum https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf £21Bn of which is attributed to UK businesses We will look at some of the common types of fraud we are seeing occurring within our marketplace today. I will give you a brief insight into the process of the fraud along with some tips and considerations to help you protect against these
  2. Everyone who has an email account will have experienced this approach! Emails that look like they are from a known brand but are fake containing fake links etc Can feed into fake websites Tips to prevent Anti Virus – use a known brand, keep it up to date Trustee Rapport – industry recognised software used across multiple organisation including natwest to validate websites you access Spam Filters – many ISP and email providers run spam filters to filter out mass mailings Https:// - look out for the S to show a site is secure, links to Trusteer Rapport Software Don’t respond – most email, like calls, are anticipated from known sources. How would you act to a cold call? Don’t click links Phising@ natwest.com – most larger companies reserve this for such incidents to tackle on a collated basis.
  3. Advanced form of phishing which also uses contact via phone. 2 Main avenues Social Engineering – portraying to be Bank, police or reputable organisation often on the pretence of helping you. Request pin numbers, bank transfers, passwords test transfers. Information Jigsaw – multiple small attempts to collate data item such as address, account number, key contacts. Fraudsters then pull these together in order to make an impersonation fraud attempt such as CHAPS, cash withdrawals, change of bank details . Tips to prevent Question who is calling – don’t assume they are a known person if they provide simple details such as names/address when calling Decline personal information – no authority or bank staff will ever get aggressive if you refuse to provide information. Simply tell them you will contact the organisation by a known number. Use a different number, maybe different phone to call back (fraudsters often leave the line open for your return call – wait 5 minutes) Caller ID – these can be imitated to the extend they can manipulate the name rather than number appearing Never make impromptu transfers Banks will never ask for your pin and password in full
  4. First two can occur personally, this is aimed at business Aimed at businesses of all sizes – large business due to breakdown in communication between teams, small business as they are perceived to be easier to persuade (may have a smaller/part time finance function) Fraudsters build a picture of your payments - suppliers names, current details, typically amounts, frequency Then look to instigate a typical redirection – advice by email, phone, letter Client innocently make payment to new location which is swiftly transferred through multiple accounts, overseas etc. Tips to protect Missing post – to obtain copy invoices and understand your payment patterns Validate all changes of address – we do as a bank! Call the company, speak to a known contact. Dual authorisation to change payment details
  5. Who knows this firm? Trades on the NYSE Computer networking – tech savvy? TO $650M+ 500+ employees Aug 6th 2015 – market update included a disclosure of $39.1m bogus boss fraud – being $46.7M of which just $8m recovered (http://fortune.com/2015/08/10/ubiquiti-networks-email-scam-40-million/) No insurance cover.
  6. “Boss” commonly MD to FD however it could be the other way round, or FC to MD Emails or texts used – emails often spoofed to look like a company email Tips to protect Question if you have received such instructions before Validate email/text is genuine - check the email/phone number received from speak to the person, they are likely to be known to you.
  7. Undertake business with new client – may seek pro-forma payment, upfront. Client pays but then highlights an error in keying. Decimal point in the wrong place, too many zeros. Looks to rectify by you sending the balancing amount back- this ia separate unique transaction Original payment is then removed from bank account in clearing cycle. Net loss = 36k in this example. Tips to protect New clients – most long standing client relationship will be aware this will bring such relationship to an end! May make 2 or 3 small transaction perfectly fine to build a level of trust Background checks– those who insure your debts will do this as a matter of process, those who don’t may not. Think back to the days of bounced cheques if someone game you a cheque, when would you release your goods? Payment type – typically deposit a chq or draft over the counter, or make a foreign payment. Was this how the deal was arranged/discussed? Call the bank to validate payment and confirm it is cleared funds.
  8. Banks, including NatWest, currently carry the cost of fraud when clients are not negligent What is negligent? Sharing bankline/online banking log-in (internal fraud) Not having trusteer rapport software installed, Not having UTD antivirus Disclosing (writing down!) pins and passwords Falling out of scope of cover would be when you have set up and made your own payment following a fraud – this is a separate transaction authorised by you. Don’t underestimate fraudsters – they may use small parts of each of the above types of fraud to construct a more complex attempt. Banks are working behind the scenes to protect you! Profiling, screening, systems and checks. According to a recent BBC article banks prevent £6 in £10 of fraud attempts in the first half of 2016 [handover] most of the above types of fraud exploits basic human behaviour traits in the increasing busy lives we lead. The following part of this seminar will focus on a form of fraud which exploits technical loopholes Lisa from AAG systems will now explain this in more detail…..
  9. Brief introduction to who we are and what we do.
  10. This is an issue which is growing in importance. Part of it is the technology side of it – the more connected we are the more risks there are. But also regulators have started to pay attention so there is increasing focus on this. Regulators like the ICO are starting to get more powers, and cyber security specific initiatives are being set up. Sector specific regulators like the FCA are paying more attention too. You might question why the HSE is on there. Simple answer – as more and more things get connected to the internet (internet of things), the risks increase. If you have safety critical equipment which is controlled via your networks a cyber attack could impact on this.
  11. Some of these risks are risks that you want to guard against from a commercial point of view anyway, but could all have legal consequences – e.g. if you can’t maintain services what is your contractual liability to clients? If client data has been accessed as part of the incident is there a potential claim against you for this? Is there a risk of a PI claim if someone gets injured? On the flip side, if you have suffered financial loss, reputational damage or a loss of confidential information do you have any routes to recover these or to take action against the party responsible? And finally, are there any regulatory consequences? Fines aren’t just for big companies like Talk Talk. The ICO has issued fines against a nursing home (£15,000) and a historical society (£500) when personal data was held on an unencrypted laptop which was then stolen. Stolen unencrypted laptops are a recurring theme in ICO enforcement action.
  12. I’ve mentioned regulators a couple of times, and want to give a flavour of what this covers. Not all IT systems are subject to regulatory obligations but the scope of regulation is increasing. The big one is personal data – currently the DPA but to be replaced by the GDPR. There’s also a new cyber security directive and I’ll look at both of these shortly. There is a lot of regulation around financial services and it’s important to remember that even if you’re not directly regulated by the FCA, if you provide services into the sector your clients may want to flow specific obligations through to you. The FCA requires them to put strong contracts in place. They may also want you to pick up the tab if they get fined as a result of your breach. There are also specific requirements if you hold payment card information.
  13. Personal data is data about living individuals. It’s subject to specific rules, and these are even stronger for sensitive personal data which includes things like health information. The DPA is nearly 20 years old and is being replaced next year by the GDPR. This is European law but will happen regardless of Brexit. They cover much more than just security, but 2 important points to note in the context of this seminar are first that both of them require you to put appropriate security measures in place for all personal data. If you fail to do this you could face enforcement action or fines. Secondly, under GDPR there are notification requirements where there is a security breach. At the moment notification of a breach is voluntary although there is ICO guidance as to when you should and shouldn’t notify. Under GDPR notification requirements are much stronger and some notifications will be mandatory. With relatively short timescales it’s helpful to understand in advance what you need to do because in the immediate aftermath of a breach there will be lots going on and you don’t want to overlook this.
  14. The cyber security directive catches two main groups of businesses. Operators of essential services will be listed, so it will be fairly easy to know whether this applies to you. This covers things like infrastructure and utilities but also financial services. Also includes some health care businesses like hospitals and GP surgeries. Digital service providers are subject to slightly less stringent requirements. This covers specific types of online service, but not all IT related services. It also doesn’t cover the smallest businesses. Again, the two key points are the requirement to put appropriate security in place, and the requirement to notify incidents. Risk management systems and reporting processes will be important to help you do this. Again there are likely to be fines if you don’t comply.
  15. I’ve talked a bit about regulatory notification obligations, but there are other legal issues to think about in the event of an incident. It’s always useful to understand what these are in advance so that you can prioritise what you do in the immediate aftermath. As well as regulatory notifications you may have contracts (particularly if you deal with FCA registered clients) which require you to notify those customers. These sometimes kick in even if the customer wasn’t directly affected. If you have potential liability to a third party, maybe for non-provision of a service, you may want to take steps to manage that liability including thinking about what you will say to the customer. You may want to look into your options to pursue the perpetrator. This is a big issue for employee fraud, and again you need to act quickly to do this. Mark will look at a case study on this. Finally, one advantage of using lawyers as part of your incident management is that advice you are given benefits from legal privilege meaning that you would not necessarily have to disclose it to a regulator investigating the incident.
  16. My last slide is a quick note on personal liability for directors. Most of what I’ve covered is liability for the company rather than the individuals, but there are routes to bring actions directly against directors. Under the DPA criminal proceedings can be brought against a director where an offence is committed with the consent, connivance or neglect of a senior officer of the company. It’s rare but there have been a couple of prosecutions. There is also the possibility of an action by the company against the director for breach of directors duties e.g. that the director has not exercised reasonable care, skill and diligence or has not promoted the success of the company. Different regulatory regimes also put specific obligations on individuals. In a DP context the ICO can request undertakings from directors and if these are not complied with the director could face liability. Hand over
  17. Mark
  18. Mark
  19. Mark