Ransomware and Data breaches in public libraries

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.

Information Security Steven Hall 21 st Jan Today’s Presentation Why do this now? What is information? The effects of lost information Newcastle.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Why Comply with PCI Security Standards?
Payment Card Industry (PCI) Data Security Standard
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Insurance Institute for Business & Home Safety Even if the worst happens, be prepared to stay.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
MIS323 – Business Telecommunications Chapter 10 Security.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Safe Computing Practices. What is behind a cyber attack? 1.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
Welcome to the ICT Department Unit 3_5 Security Policies.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Washington State Auditor’s Office Cybersecurity Preparing for the Inevitable Washington State Auditor’s Office Peg Bodin, CISA, Local IS Audit Manager.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Securing Information Systems
Cyber Insurance Risk Transfer Alternatives
CompTIA Security+ Study Guide (SY0-401)
E&O Risk Management: Meeting the Challenge of Change
Building A Security Program From The Ground Up
What Does GDPR mean for you
Cyber Crime What’s all the fuss about?
Responding to Intrusions
Data Compromises: A Tax Practitioners “Nightmare”
Current ‘Hot Topics’ in Information Security Governance Auditing
Securing Information Systems
Unit 7 – Organisational Systems Security
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Reporting personal data breaches to the ICO
All data occupies physical space, even if we don't think of it as such.
Curating an Effective Security Culture
Navigating Security Seas in a Small Ship with a Limited Crew
GDPR Quiz Today’s trainer: Click here to use Kahoot! 1
Anatomy of a Large Scale Attack
Incident response and intrusion detection
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
Cyber Security: What the Head & Board Need to Know
Tom Murphy Chief Information Security Officer
DATA BREACHES 6 4 , 9 3 There were…
Presented to Information Systems Security Association of Orange County
Presentation transcript:

Ransomware and Data breaches in public libraries

What is Ransomware A specific type of malware that targets a computer or network with the intent of holding it hostage for payment. The infection can be caused by an intentional (such as a hacker) or an accidental (clicking on a phishing email) source The once the malware is in the system it encrypts the data until the release code is entered. Some strains of ransomware also send key types of data back to the hacker. First ransomware attack occurred in 1989 (Aids Cyborg)

What is a Data Breach A data breach is the unintentional or malicious release of sensitive information Depending on the information (and the industry) this can have financial or legal repercussions. Data breaches can be caused by electronic or paper means in the state of Wisconsin

Results in a Nutshell part 1 Library Data Breaches are not reported in a central location Ransomware is considered “big news” and tends to get more press in technical journals Library records had not been assigned a quantitative value for risk assessment purposes

Results in a nutshell part 2 Based on the publicized ransomware attacks, the financial loss for libraries from a data breach could catastrophic St Louis Public Library: (859,000 * 167.50) = 145,907,290.00 Spartanburg: (269,291 * $167.50) = $45,106,242.50 Brownsburg: (40,256 * $225.00) = $9,057,600 Some libraries (.14%) have documentable information security policies Wealthy libraries and systems have invested in cyber insurance but a levels that would not cover a full breach.

What are Library Records worth? Value does not refer to Dark web market value (average total records packe value $30) Value refers to total cost of recovering from a data breach per record This cost includes: Legal fees Network repair Notification of affected parties Penalties Loss of income due to loss of customers/clients/patrons

Library records values part 2 Because of reciprocal borrowing, this value differs from state to state The more liberal the reciprocal borrowing polices the higher the records value No reciprocal borrowing $110.00 (public service level Ponemon institute) Partial reciprocal borrowing $167.50 Full reciprocal borrowing $225.00 (average value of a data record in the United States. This is due to churn or potential patron turnover Wisconsin's’ records are valued at $225.00 To put that number in perspective had L.E. Phelps Memorial Library had a true data breach the estimated cost would have been $19,061,775

So what does that mean for us?

Information Security is essential to your library

Policy Procedure Training Response

Setting up an Information Security Policy is essential What should the policy contain? What are we protecting? What are the objectives (aka how secure are we going to be?) Who does what and who has ACCESS to what. Reference legislation (aka what statutes we need to follow based on our industry Source: Infosec Institute: Key Elements of an Information Security Policy; https://resources.infosecinstitute.com/key-elements-information-security-policy/#gref

What can a policy contain Security Policy part 2 What can a policy contain Data Movement criteria (What mediums are allowed or disallowed) Backup Criteria (frequency, storage criteria, access to backups etc) Network security strategies (antivirus, firewalls, etc.) Source: Infosec Institute: Key Elements of an Information Security Policy; https://resources.infosecinstitute.com/key-elements-information-security-policy/#gref

What legislation effects us? Wisconsin Statute 134.98 (Data breach Statute) Graham-Leach-Bliley Act Red Flags Law https://docs.legis.wisconsin.gov/statutes/statutes/134/97/4/b

Service Level Agreement (SLA) Used to define who is responsible for what in an IT service contract Is your provider going to do your backups? What documentation will they provide? Will they do your patching (aka system updates) what documentation will be provided In the event of a data breach/malware incident what will be their role? https://www.givainc.com/blog/index.cfm/2017/8/23/6-Key-Components-of-a-Service-Level-Agreement-SLA https://www.cio.com.au/article/268177/service-level_agreements_101_an_executive_guide_service-level_agreements_slas_/https://www.cio.com.au/article/268177/service-level_agreements_101_an_executive_guide_service-level_agreements_slas_/

Procedure Policy is what you will do Procedure is how you will do it. Procedures that would bolster library security Authentication aka password procedure Access Rights (including physical) Onboarding/offboarding procedures

Training – “knowing is half the battle” Policy training – make sure the information security policy is reviewed on a regular basis Procedure training aka “if someone asks us….” Incident response training aka “if this happens what do I do”

Training tools https://securityiq.infosecinstitute.com/ https://irtsectraining.nih.gov/publicUser.aspx https://iase.disa.mil/eta/Pages/online-catalog.aspx

Incident response – aka what to do when the worst happens Isolate the threat Who needs to be contacted? Who cleans up the infections? Examples and more resources https://www.sans.org/summit-archives/file/summit-archive-1506371074.pdf http://www.csirt.org/sample_policies/index.html https://www.incidentresponse.com/resources/policies-plans/ https://www.alvaka.net/steps-for-an-effective-cybersecurity-incident-response-plan/ After you have your IRP in place make sure you practice – just like a Fire Drill

Remember, You can do everything right and you will still be compromised

That being said you can still protect your self and your patrons Less is more – think long and hard about the data you keep in your online system At the Library System Level consider a coding system for birthdays/ages Make sure you have a paper records disposal policy Know what happens to your photocopier – they are actually a form of computer at this point.

Questions?