Mary Kummer Jim McNall PRIMA Spring Training 2018

Slides:



Advertisements
Similar presentations
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Advertisements

Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Scams & Schemes Common Sense Media.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
INTRODUCTION & QUESTIONS.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Gosbecks E-Safety Guide
Cyber Info Gathering Techniques
Lewis Creek Systems, LLC
3 Do you monitor for unauthorized intrusion activity?
Edexcel GCSE Cyber security threats Computer Science 1CP1
April 10, 2009 Outlook Tips & Tricks.
An Introduction to Phishing and Viruses
Ransomware: 50 Shades of Pain
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
Identity theft vector of the electronic age
links and attachments: Help stop malware from spreading
Unit 4 IT Security.
CS101 Security.
Digital Citizenship Middle School
Information Security.
Cyber Crime What’s all the fuss about?
Lesson 3 Safe Computing.
Overview 1. Phishing Scams
How to build a good reputation online
October 26, 2017 Main Line Association for Continuing Education
Phishing is a form of social engineering that attempts to steal sensitive information.
Encryption Ransomware
Staying Austin College
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Practice Safe Computing
IT Security awareness Training.
Robert Leonard Information Security Manager Hamilton
4 ways to stay safe online 1. Avoid viruses and phishing scams
- St. Clair County Network-
Risk of the Internet At Home
Cyber Issues Facing Medical Practice Managers
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Network Security Best Practices
The information in this presentation is marked as:
Keeping your data, money & reputation safe
Ransomware and Data breaches in public libraries
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Information Security – Sep 18
Phishing 101.
Internet Safety By: Ayana Shiggs.
Cybersecurity: Don’t Be Scared; Be Prepared Dean Choudhri, CISSP, CISM, CRISC Assistant Vice President, Cybersecurity and Information Assurance Alloya.
Internet Safety By: Ayana Shiggs.
Cybersecurity Simplified: Ransomware
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Mary Kummer Jim McNall PRIMA Spring Training 2018 Cyber risk! Mary Kummer Jim McNall PRIMA Spring Training 2018

Learning Objectives: Learn about cyber risks and what to do when you get invaded by malware. Know you have cyber coverage in your ICRMP insurance. Receive tips for staying safe online.

Two most common and most effective cyber attacks: The 1st is Ransomware. Ransomware enters the system though many ways. Email links/attachments, someone clicks a link, before you know it, no files can be opened or accessed. The ransomware encrypts the files and holds them “ransom” until you pay the requested amount of money.   Watch this 30-second video on ransomware.

The 2nd common cyber attack: phishing The 2nd common cyber attack: phishing. There are different types of phishing scams, but they always involve links or attachments in an email. They can even be made to look like they are coming from a real person in your agency.   Phishing scams are also becoming more targeted. Hackers will learn about your agency and then send emails that are better at tricking people into clicking links or attachments.

Covers data breach response and costs. Assist with the cost of reconstruction. Covers the cost of notifying individuals of potential hacks.

What can Idaho local governments do? TRAIN EMPLOYEES Train. If it looks suspicious or you have any doubt at all that it might not be real….verify with the person who sent it via phone or in-person.

Avoid Being A Victim! Backup data…Off-site & often Hire professional IT staff/firm Verify email requests before sending information Be extra cautious of links & attachments Don’t click on advertisements You will be targeted. At some point, if you haven’t already, you’ll be the target of a scam.   Here are some simple steps to take to avoid or lessen your chances of being a victim, or to minimize losses and frustration when you do get attacked. ICRMP has a malicious attempt to enter our systems or look for weaknesses on a daily basis. So you probably do, too. Backup your data, hire professional IT staff or outside vendor – that goes without saying. If you don’t already do those things, start today. Backing up your data will give you a better chance at not having to pay the ransom, because you can restore your data from the backup. BUT YOU ARE STILL RESPONSIBLE IF THEIR DATA THEY STORE FO YOU IS HACKED, SO REVIEW YOUR CONTRACTS CAREFULLY Verify email requests before sending any information. All it takes is a quick phone call. The “from” line of an email is easy to forge, so hackers are now making it look like the email is from someone at the agency, even though it’s not. Don’t open any attachment or click on any link in an email unless you know the email is legitimate. If there’s any question in your mind, even one shred of doubt, call to verify with the sender of the email before you click anything.

I got attacked….now what? Call your IT IMMEDIATELY Call ICRMP Next Don’t delete anything! Work with ICRMP & experts to resolve   Don’t hesitate, don’t wait – call ICRMP (or whoever your cyber liability insurer is) immediately. Don’t delete anything – this is often our first instinct. However, deleting files that you think are infected can prove to be problematic. As soon as you call ICRMP, we get our experts involved. That includes our reinsurer, forensic experts and others. To properly identify how the attack happened and what exactly was affected, they need to see everything. So even though it’s your first instinct, don’t delete anything. Once you call ICRMP, you’ll quickly be put in contact with our re-insurer and all the experts they use to remedy these issues. They deal with these attacks on a daily basis and will quickly help you get back up and running.

The best protection is YOU!

CYBER RISK #7 CLAIMS Area CRIME Things you can do… Theft and embezzlement… Things you can do…