U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Protecting Our Personal Space Security in a Virtual World.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
General Awareness Training
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Cyber crime & Security Prepared by : Rughani Zarana.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
ICT in Banking.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
CYBER CRIME.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Information Security Sharon Welna Information Security Officer.
Jeff loses his identity! Lesson 8: Identity Theft.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Issues for Computer Users, Electronic Devices, Computer and Safety.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Jeff loses his identity! Lesson 5: Identity Theft.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
October 27, 2016 Main Line Association for Continuing Education
Protection of CONSUMER information
Digital Citizenship Middle School
Protecting Your Identity:
Data Compromises: A Tax Practitioners “Nightmare”
Information Security 101 Richard Davis, Rob Laltrello.
When you get caught for Identity Theft
Cybersecurity Awareness
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Protecting Your Identity:
Red Flags Rule An Introduction County College of Morris
Digital $$ Quiz Test your knowledge.
Protecting Yourself from Fraud including Identity Theft
Security in mobile technologies
Presentation transcript:

U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been the Victim of a Breach…. ….the waiter asks how you can consider that dessert with your medical history …a co-worker tells you you’re not as bad as your personnel file suggests…a co-worker tells you you’re not as bad as your personnel file suggests …..people greet you by your Social Security number When traveling, the hotel bartender serves you before you orderWhen traveling, the hotel bartender serves you before you order Your kids come home crying because the other kids are picking on them about your credit card balance. Source: Federal Communications Week, September 30, 2015

U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness But seriously….. Do you have employee and customer data? Bank account and financial information? Intellectual property? Do you have a network of suppliers, customers, and other contacts? Then your business has something of value to cyber- criminals

U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness If Your Business Has Been the Victim of a Breach…. Inform local law enforcement or the state attorney general as appropriate. Report stolen finances or identities and other cybercrimes to the Internet Crime Complaint Center. Report fraud to the Federal Trade Commission. Report computer or network vulnerabilities to US-CERT (Computer Emergency Readiness Team) via the hotline: or the US-CERT website.

U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness 10 Tips Cybersecurity Awareness 10 Tips 1.Protect against viruses, spyware, and other malicious code 2.Secure your networks--Safeguard your Internet connection by using a firewall and encrypting information. 3.Establish security practices and policies to protect sensitive information. 4. Educate employees about cyber-threats and hold them accountable. 5. Require employees to use strong passwords and to change them often. 6. Employ best practices on payment cards.Are you ready for the shift from magnetic-strip payment cards to safer, more secure chip card technology, also known as “EMV”? Visit SBA.gov/EMV for more information and resources. SBA.gov/EMV 7. Make backup copies of important business data and information. 8.Control physical access to computers and network components. 9.Create a mobile device action plan. 10. Protect all pages on your public-facing websites, not just the checkout and sign-up pages.

U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness SBA Resources Cybersecurity Awareness SBA Resources 10 Tips Online Courses and webinars SBA 30 minute training—overview and best practices learning centerwww.sba.gov Self assessment resources-links at FCC Cyber-planner – point and click to create your planner-very easy Cyber assessment—more detailed. Can self assess or request in person assessment from DHS. Assessment tool for small and medium-sized businesses at the US- CERT website EMV chip technology video on SBA’s YouTube page

U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness EMV Chip Technology Cybersecurity Awareness EMV Chip Technology On October 1, liability for card-present fraud shifted to whichever party is the least EMV- compliant in certain fraudulent transactions. Small businesses doing card-present transactions need to have an EMV card reader and software to avoid liability Webinar video

U.S. Small Business Administration Answers | Resources | Support For Your Small Business MILWAUKEE 310 W. Wisconsin Avenue, Suite 580W Milwaukee, WI Phone: Wisconsin Offices MADISON 740 Regent Street, Suite 100 Madison WI Phone: