Download presentation
Presentation is loading. Please wait.
1
Cyber Security Do’s & Don’ts - 2019
IMTIAZ MUNSHI, CPA – Co-founder & CEO, Aztec Technologies Vice President, myCPE LLC President, Munshi CPA, PC LINKEDIN - -
2
LEARNING OBJECTIVES Introduction to Cyber Security
Identifying characteristics of best security practices Choosing the appropriate security tools / techniques Identifying Cyber Security do’s and don’t’s
3
CYBERSECURITY – AN INTRODUCTION
Meaning and understanding Concept Importance Financial Consequences Business Perspective – for the market and business owners Approach towards Cybersecurity
4
FRAMING THE QUESTION AT HAND
Security – a complicated necessity Need to be simple Passwords are important Assurance of security – systems approach People make policies work Right tools – Effective Results Verification is necessary to ensure trust
5
For Small Accounting Firms
DATA PROTECTION & ITS RELEVANCE For Small Accounting Firms
6
CPA’s AS TARGETS FOR ATTACKS
CPA’s have Confidential and Sensitive client Information. Lack of knowledge regarding good cybersecurity practices Weak Passwords Lack of proper IT controls; outdated hardware
7
DATA PROTECTION – WHY??? A Healthy Business Practice
Protecting the Firm’s Reputation Assistance in Risk Management Industry Requirements Regulatory Essentials Complying with Patriot Act / GDPR / AICPA’s GAPP Safeguards Intellectual Property
8
TECHNOLOGY FOR SMALL ACCOUNTING FIRMS
Personal Computer Centric Approach Operations Based on - Windows and MS-Office and Data Servers Networking Infrastructure Remote Access Public Cloud Website and Private Client Portal Data Backups
9
Why CPA’s are easy target for Hackers ?
Polling Question 1 Why CPA’s are easy target for Hackers ? Confidential and sensitive data of Clients. Lack of Knowledge and Weak Passwords Lack of Proper IT Security Measures. All of the above.
10
DATA LOCATION Storage While Communicating
Obvious locations – Servers, Backup Storage, PCs Not-Obvious: , Smartphone, Cloud, Printer etc. While Communicating s Uploads/Downloads LAN & Wi-Fi Transmission Online Meetings
11
DATA BREACHES Unintentional – Human errors Intentional
Transmitting to the wrong -address Poor passwords Device mal-function, or lost/stolen devices Intentional Internal (rogue employees) External Malware attack Direct external breach – Less chances as not attractive targets
12
CONSEQUENCES OF DATA BREACH - 1
Cost to client Identity theft, IP leakage Compromised bio metrics Financial damage Cost to business Confidential details leaked Revenue loss Damage to trust and reputation of brand
13
CONSEQUENCES OF DATA BREACH - 2
What would follow - Ransom Demand Financial costs of data recovery, and notifications to protect interest of the clients Litigation Fines and Penalties
14
AN ENTERPRISE APPROACH TO CYBERSECURITY
KEY FACETS - Prevention Detection Remedy Reporting
15
HOW TO MITIGATE RISK? Prioritizing security when setting up systems
Framework of tech policies and procedures Assuring physical security of data –staff, maintenance personnel, vendors, ex-employees Implementing hardware and software solutions – organizational buy-in Cyber Insurance
16
NETWORK SECURITY Strong firewall settings Strong password policies
Using ‘PRO’ versions of software + regular updates Anti-malware software Managed access to network & storage Broadband and Wi-Fi access Application access control Data encryption in transit – Restrictions on data access in software applications
17
POLLING QUESTION 2 How Data is breached ? Wrong Email Address
Poor Passwords Malware Attacks All of the above
18
HARDWARE SECURITY Ensuring server protection Secured Desktops
Phase out obsolete hardware IT infrastructure management Ensured security measures from Internet of Things
19
SECURITY PERSPECTIVE OF MOBILE DEVICES
Mobile Devices - Smartphones, tablets, laptops, USB drives Setting up Right IT infrastructure - Company owned or BYOD Data stored in Mobile Devices (e.g. ) Mobile device management systems Rights policies and effective enforcement
20
REMOTE ACCESS AND CYBERSECURITY
Desktop devices at homes and offices Hosted virtual desktops No DIY fixes No Starbucks Beware home Wi-Fi
21
CLOUD TECHNOLOGY Utilizing the cloud technology
Public Private Hybrid Key points while using cloud technology Encrypt sensitive files stored in cloud Strict company policies Considerations for the Patriot Act Section 125 / European GDPR
22
EMAIL SECURITY Email Security Facts Email Security Recommendations
Security is assured only before the is sent, beyond that it is uncertain Highly vulnerability to human errors Need for encrypting message body and attachments Modest adoption of encryption on account of complexity 38% who do encrypt use manual encryption Study: 30% of business needs encryption Security Recommendations Must not interfere with workflow Must maintain file format of encrypted attachments
23
CYBERSECURITY STARTS WITH PASSWORD SECURITY
24
PASSWORD STRATEGIES Multiple Authentication
Something you know – Password Something you possess – A token or a specific Smart Card Something you are – Biometrics such as thumb prints, Retina Eye verification An identification Password Screen Image Alternative authentication methods No Password Required Device access restricted within premises or Geo-Location Company policy for passwords and passphrases Password Management Tools Randomly generated passwords Add layer of authentication – Dual or multi-level security for higher sensitive data
25
Which Password Strategy is best ?
POLLING QUESTION 3 Which Password Strategy is best ? No Multiple Authentication Easy to remember passwords Biometrics
26
PRACTICAL TIPS FOR SMALL FIRMS
QuickBooks data file transfers – “Qbox” is one solution Recover lost QuickBooks admin password - Password Managers – LastPass; Dashlane Remote access software – Logmein; PCAnywhere; GoToMyPC Remote desktop connection – set up a dedicated IP address Sample Staff Technology Policy – Starbucks – use your phone hotspot instead of free Starbucks WiFi encryption - docNCRYPT
27
CYBER SECURITY - MUST DOs
28
CYBERSECURITY FOR SMALL FIRMS THE MUST DOs
Educate yourself and your staff about Cybersecurity Company Tech Policy signed by all staff members Use strong logins and passwords Multiple authentication where possible Change passwords regularly Encrypt sensitive information Disk drives and folders Individual files Protect all devices against malware (even admin computers) Update your systems and software regularly Hire an expert Backup data daily; archive 4 weekly backups
29
CYBER SECURITY DON’TS
30
CYBERSECURITY FOR SMALL FIRMS THE MUST-NOT-DOs
Don’t leave your device unattended in public places Don’t forget to lock your device when not at your desk Don’t trust – verify and ensure Links Software Programs Don’t write down passwords Don’t open and attachments from unknown sources Don’t plugin unauthorized devices to a work or personal computer Don’t use public WiFi; use your mobile phone hotspot if you have to Don’t provide your normal WiFi PW to guests; setup a guest PW instead
31
‘Do It Yourself’ VS ‘IT EXPERT’ – A COMPARISON
Cost Assurance Failure Risks Success ratio – Statistics for small firms Compliance Need of the changing times
32
PREPARING TEAM FOR THE CHALLENGE
Training Testing Implementing policies encryption Strict policies and enforcement regarding mobile devices on premises Telephonic confirmation required for wire transfers Confirmation Text
33
SESSION OVERVIEW Cybersecurity – understanding and importance
Data Security and relevance for Small Accounting Firms CPAs as targets Tech for small CPAs Data breach – Types and Consequences Enterprise Approach Towards Cybersecurity Framing the questions at hand Do’s and Do not’s DIY Vs. IT Expert a Comparison How to prepare your team for good cybersecurity
34
THANKS! DO YOU HAVE ANY QUESTIONS??? REACH ME -
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.