For Holding Companies Accountable for Data Security Breaches Victor Flores CIS 1055.007.

Slides:



Advertisements
Similar presentations
Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Copyright © 2014 by Dr. Wendy Tietz. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License. Target, Data Breach,
SECURITY CHECK Protecting Your System and Yourself Source:
DATA BREACHES IN HEALTHCARE BY CHUCK EASTTOM
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
1 Identity Theft and Phishing: What You Need to Know.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
2012, Team-Tiger- Northwestern McCormick MSIT 2013 Confidential 1 ©2011, Cognizant Northwestern McCormick MSIT October 20 th, 2012 Information Security.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Security Concerns at Offshore Development Centers MIS Practicum Presentation Week 6 Ashish Bahety.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
By : Injeong Lee 9CC. 1. Creator of this Presentation   2. What is Digital Security?   3. Why is Digital Security important?   4. How does Digital.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Staying Safe Online Keep your Information Secure.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Identity Theft.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Update on Privacy Issues at USU October 10, 2013.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Jeff loses his identity! Lesson 8: Identity Theft.
You. are at risk for the fastest growing crimes crime.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
AFFIRMATIVE: Software companies should be held responsible for damages due to buggy software. Nyam Adodoadji, Julia Cormano, Michael Noonan, Ren Provey.
Society & Computers PowerPoint
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft: Protect Yourself Ronald J. Leach.
Identity Theft How bad people get good credit. Lindsey Bertugli.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Credit Identity
Combating Identity Fraud In A Virtual World
Gift Card Risk Mitigation – Presentation A
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Handling Personal Data
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Jeff loses his identity!
Data Breach Overview Mike Schenk, VP Research and Policy Analysis
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Figure 1. Number of Records Breached
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Protecting Yourself from Fraud including Identity Theft
Laws Against Computer Hacking
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
School of Medicine Orientation Information Security Training
Presentation transcript:

For Holding Companies Accountable for Data Security Breaches Victor Flores CIS

Top Security Breaches in recent history Card Systems: Over 40 million credit card accounts were exposed to potential fraud TD Ameritrade: The online trading company reported that 6.3 million of their users information was stolen including their names, addresses, and phone numbers.

2009 Hannaford Bros. Chain: Famous supermarket chain reports of a security breach that put at risk over 4.2 million people could have had their credit card and debit card numbers stolen 2009 U.S. Department of Veterans Affairs: 76 million veterans discharge paper, social security numbers and health care records compromised when a defective hard drive did not have the information erased when it was sent to be recycled.

You may be wondering why there have been so many security breaches at so many large, big name companies like TD, Bank of America, Visa, Master Card and even with the Federal Government at the Veterans Administration? There are several reason that these organizations are the reason for their own security problems. Many of the users within these organizations are negligent with your personal information and therefore should be held accountable for the loss and potential misuse of you information.

Why network security breaches are occurring at an alarming rate? Poorly configured security systems Inferior anti virus programs, which are more cost effective for the company. Lack of maintenance and updating of security systems. Putting uncertified people in charge of the security system of the company. The company’s network may be to big for the security software to protect everything.

Why network security breaches are occurring at an alarming rate? Poorly configured security systems Inferior anti virus programs, which are more cost effective for the company. Lack of maintenance and updating of security systems. Putting uncertified people in charge of the security system of the company. The company’s network may be to big for the security software to protect everything.

Beware of 10 of the top institutions where you information can be accessed and misused as well. 1. Universities and Colleges 2. Banking and Financial Institutions 3. Hospitals 4. State Governments 5. Local Governments 6. Federal Government 7. Medical Businesses 8. Non Profit Organizations 9. Technology Companies 10. Medical Clinics and Medical Offices

References Robert Siciliano, “Mcafee Reveals the top Ten Most Dangerous Places to Leave your Social Security Number.” The Huffington Post te_b_ html Ki Mae Heussner, “10 of the Top Date Breaches of the Decade.” ABC News, breaches-decade/story?id= &page=1 Ray Bryant, Network Security Breaches Occur Thanks to Cheap Investments.” TMCNET, security-breaches-occur-thanks-cheap-investments.htm Sharon Gaudin, “Feds’ Own Hacker Cracks Homeland Security Network.” Information Week ,