Policies and Procedures to Protect you, your Office and your Data

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
New Data Regulation Law 201 CMR TJX Video.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Security Phishing Update CTC
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
1.1 System Performance Security Module 1 Version 5.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Security & Fraud – The impact on small businesses.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Securing Information Systems
Work on the Fly Hosted Solutions for Timeslips Customers
E&O Risk Management: Meeting the Challenge of Change
Working at a Small-to-Medium Business or ISP – Chapter 8
Information Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
I S P S loss Prevention.
Data Compromises: A Tax Practitioners “Nightmare”
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Your Computer Wants To Ruin Your Life
Information Security 101 Richard Davis, Rob Laltrello.
Business Risks of Insecure Networks
CHAPTER 4 Information Security.
Securing Information Systems
MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING
Chapter 3: IRS and FTC Data Security Rules
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
Robert Leonard Information Security Manager Hamilton
Curating an Effective Security Culture
12 STEPS TO A GDPR AWARE NETWORK
Information Security Awareness
Cybercrime and Canadian Businesses
Information Security – Creating Awareness, Educating Staff, and Protecting Information Session 46 Chris Aidan, CISSP Information Security Manager Pearson.
How to keep the bad guys out and your data safe
24/7/365 Remote Computer Support
Security in mobile technologies
CYBER SECURITY FOR PROACTIVE EAs (From Liability to Defender)
Introduction to the PACS Security
Presentation transcript:

Policies and Procedures to Protect you, your Office and your Data Technology Systems Policies and Procedures to Protect you, your Office and your Data REBA’s Residential Conveyancing Section – Open Luncheon Wednesday February 27th, 2019 at 12pm REBA Boston

Infrastructure Upgrade & Maintenance 3-5 year Schedule Monthly Maintenance Anti-Virus, Malware Software updates

Infrastructure Upgrade & Maintenance OS patches and upgrade Java, flash, adobe are security concerns Remote monitoring Firewall monitoring Prevent DoS Attacks!

Disaster Planning and Recovery Business Continuity Mitigating Downtime When Disaster Strikes! Preparation is KEY! Have a Plan!

Disaster Planning and Recovery Backing up data daily using two independent systems. Typically: Nightly online backup Local onsite backup of the system image to a portable hard drive (Rotate Offsite) Perform a test restore from the backup media each month (Make sure it works!)

Information Security Protecting NPPI 201 CMR 17.0 (WISP) Notice of Breach Law 93H (Duty to Report) Proper Disposal

Information Security Clean desk policy? Limiting access to scan solution? All cabinet files locked? Mobile devices secure? Control over flash drives?

Information Security NPPI training? Using encryption? Background checks on employees?

Cybercrime Hygiene Damage costs to hit $6 Trillion annually by 2021 Dark Web Evolution Ransomware Wire Fraud Phishing Scams Mules Key Loggers

Cybercrime Hygiene Use strong Passwords Use domain name email Encrypt NPPI Email security (Forward) Wiring protocol Funds transfer agreement Use a log with all parties

Cybercrime Hygiene Business Email Compromise (BEC) protocol – training Beware of FREE WIFI when using firm mobile devices. Beware of FREE Charging stations (“Video” and “Juice” Jacking) Consider Cyber Privacy and Media Liability Insurance.

Protection in the Digital Age Social media concerns Like-jacking - Beware of fake “Like” buttons on web pages. Malware threat! Link-jacking - You click on a link and get re-directed to a malware infested site. Social Phishing – A link disguised in a seemingly trustworthy Facebook message or Tweet. (Usernames, passwords and credit card #’s at risk) LinkedIn – Gather info to use on phishing attempts. Don’t share too much!

Protection in the Digital Age IoT Concerns in the Office “Internet of Things” “Alexa” in the Office Cameras Lighting Locks Thermostats Security concerns

THANK YOU! Jim Sifflard Andrew Rosenthal Noel DiCarlo SVP, NE Sales Manager Old Republic Title Insurance Andrew Rosenthal Principal & CEO ArcLight Technologies Noel DiCarlo Partner Warshaw, DiCarlo & Associates