Download presentation
Presentation is loading. Please wait.
Published byEmma Ward Modified over 8 years ago
1
Session 13 Cyber-security and cybercrime
2
Contents What’s the issue? Why should we care? What are the risks? How do they do it? How do we protect the firm? What if the worst happens?
3
What’s the issue?
4
PRIORITY RISK
5
What’s the issue 60-81% report breach… £65k-£1.15m cost of one breach… 84% believe colleagues violate controls… …GLOBAL COST - £338 bn
6
Why should we care?
7
Why should I care? Principle 10: Protect client money and assets Outcome 4.1: Keep the affairs of clients confidential Principle 8: Run your business effectively and in accordance with proper governance and sound financial and risk management principles http://www.lawsociety.org.uk/advice/cyber-security/
8
Why should we care? Breach of confidentiality Structural and financial instability Reputational damage
9
Confidentiality What are the risks?
10
Confidentiality Client lists Strategic client information or personal data Financial information Payment and transactional information Trade secrets Personal details of prominent clients dealings Must protect client confidential information
11
Structural and financial instability What are the risks?
12
Structural and financial instability Systems unavailable Financial losses Overloading Dependence on IT infrastructure Reputational damage
13
What are the risks?
14
Reputation damage BOGUS LAW FIRMS
15
How do they do it?
16
Phishing Malware Hacking Overloading Identity theft
17
Identify our vulnerabilities… How can we protect our firm?
18
Identify your vulnerabilities People Passwords Operations Too much information
19
Take action! How can we protect our firm?
20
Take action – the ‘do’ list Manage the risk properly Restrict data sticks and email attachments Keep browsers etc updated Restrict file access Take identity theft precautions Have a policy Encrypt remote data Back-up Sound HR procedures Training and awareness
21
Take action – the ‘don’t’ list! Use unsecured webmail or unapproved devices to transfer files Use guessable passwords and locally stored files Let your operating systems fall behind Store critical files online without backups. work remotely on an unsecured Wi-Fi connection
22
What if the worst happens?
23
Contain and recover Assess on-going risk Notify Evaluate and respond
24
Summary What is cybercrime Why it’s important to us The risks Cybercrime types and methods Protection Incident management?
25
Final comments Any questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.