Archives page

Posts Tagged ‘data breach’

Get a Data Breach Response Plan

As data breaches proliferate in and outside the government, companies are faced with serious ramifications if not addressed by leadership.  With the DOD-GSA Cyber Resilience Rules looming, the NIST framework on the horizon and cyber security identified as the major priority for Congress and the Administration, GTSC’s Capacity Building session on data breach will focus on your company preparedness, incident response, notification and legal responsibilities when experiencing a data breach.  Attendees will receive a Data Breach Response Guide and walk through hands-on procedures and considerations for your data breach policy.  This is a must-attend for all small and mid-sized businesses working in the homeland and national security field.

May 22, 2014 | 8:30 am – 11:30 am
Arlington, VA

REGISTER

About Michael Bruemmer

Michael Bruemmer ExperianMichael Bruemmer is Vice President of the Experian®Data Breach Resolution group at Experian Consumer Services, the leading provider of online consumer credit reports, credit scores, credit monitoring, other credit-related information, and protection products. With more than 25 years in the industry, Michael brings a wealth of knowledge related to business operations and development in the identity theft and fraud resolution space where he has educated businesses of all sizes and sectors through pre-breach and breach response planning and delivery, including notification, call center and identity protection services. Michael is a Certified Information Privacy Professional and Certified in Healthcare Compliance.  He currently resides on the Ponemon Responsible Information Management (RIM) Board, the International Security Management Group (ISMG) Editorial Advisory Board and the International Association of Privacy Professionals (IAPP) Certification Advisory Board.   >>READ More.

Cyber Security Insurance: Does Your Company Need It?

“Cybersecurity – A Special Report”…with newspaper headlines like this in the The Washington Post, cyber security is THE hot topic.  If your company uses a computer, credit card, checking account, files a tax return, employs smart phones, or uses iPads, your business is a target for losing intellectual property or becoming the vehicle for a cyber attack — with a huge financial loss as the result.

For individuals the theft or misuse of private information occurs daily.  Signals stolen while using public internet, misplaced cell phones, fishing attacks on home computers, and theft of personal computers happen throughout our society and result in long-term financial crisis.

Small Business owners face even greater obstacles from cyber attacks.  A recent National Small Business Association reported 44% of their 800 surveyed members had fallen victim to a digital break-in.  What are the steps we can take to help thwart these information criminals?  Solutions for both companies and individual citizens are very similar.

All business firms using the internet must have a strong risk management plan established and adhere to the rules in order to lessen the impact of cyber theft.  With the growth of cloud computing, use of smart phones and tablets, employees telecommuting, and digital information flowing outside the office, cyber attackers have many more access points.  The Federal Communication Commission (FCC) lays out guidelines to prevent cyber attacks.  Among their suggestions are:

  • Train employees in security principles.  Use strong passwords with expiration dates.
  • Protect information, computers and networks from cyber attacks.  Install fire wall security, the latest security software and web browsers.
  • Create a mobile device action plan.  Password protect devices, encrypt data, and install security apps and how to report lost or stolen equipment.
  • Make copies of all important data.  Store offsite or in the cloud.
  • Passwords and authentication.  Require unique passwords and change every three months.

Many businesses have the additional exposure of outsourcing data.  Many businesses share customer information with third parties who provide billing, payroll, and employee benefits.  Additionally, web hosting, HR services, and information technology services are frequently outsourced.  Despite this outsourcing exposure many businesses do not require third parties to cover costs associated with data breach in their contacts.  When using outside partners, what is the risk-management strategy they use to protect you against financial loss and reputation harm?

Because of the explosion in internet usage many companies are seeking contractual risk transfer and indemnification through insurance.  Starting in the early 1990’s insurance has changed to provide protection for cyber growth.  Today numerous insurance companies either provide stand-alone policies or add the protection with other coverages, such as Directors & Officers policies (D&O), Errors & Omission Policies (E&O), and Fiduciary Liability policies. An E&O policy is a type of professional liability typically issued to companies setting standards for them selves or other clients.  D&O liability coverage is designed to protect companies against their management decisions and covers directors, officers, staff and the organization itself.

Cyber Liability Policies should provide protection for both First Party and Third Party Claims.

First Party coverage includes:

  • Network and Information Security Liability
  • Communication and Media Liability
  • Regulatory Defense Exposure

Third Party coverage includes:

  • Crisis Management Event Exposures
  • Security Breach Remediation and Notification Expenses
  • Computer Program and Electronic Data Restoration Expenses
  • Computer Fraud
  • Funds Transfer Fraud
  • E-Commerce Extortion
  • Business Interruption and Additional Expenses

Cyber Insurance helps before the loss occurs by going through a thorough underwriting process to help highlight the potential risk exposures to be addressed.  Nevertheless, should the loss occur these policies help in determining the data leak, PR crisis, IT crisis, and the financial crisis.

The recommendation to combat today’s cyber threat involves risk management planning, assistance from third party partners, and insurance coverage to assist should a loss occur. For more cyber security tips, visit www.US-CERT.com. Learn about the FCC’s Small Business Cyber Planner here.

Mary Jordan, “CYBERSECURITY – A Special Report,” The Washington Post, Thursday, October 10, 2013

P Allen Haney

P. Allen Haney, President, P. Allen Haney Company

Mr. P. Allen Haney is a Strategic Advisor to the Government Technology & Services Coalition. He is also a trusted advisor to business owners and nonprofit executives, Allen Haney is best known for solving problems. His consul on employee benefits, executive compensation, and retirement planning routinely vitalizes the health and sustainability of closely held businesses and associations.

He is most appreciated for his all-inclusive, uncompromising commitment to expand client capacity by uncovering risks and opportunities hidden in blind spots. Read more about Mr. Haney here.

Is Your Data Disaster-Proof?

gtsc_preparednessInformation Week, a leading IT industry news source, estimates $26.5 billion in revenue is lost annually due to network and system interruptions. Despite the potential for depleted earnings, angry customers, tarnished reputations, and lost data, over 50% of businesses don’t have an IT disaster recovery plan.

Build a Strong Foundation

Your IT systems support your business, making it is essential to design a solid infrastructure that aligns with your business goals, secures your data, and is resilient. Here are a few simple tips that many organizations neglect.

  • Schedule maintenance for off-hours. Like your car, information systems need maintenance to operate consistently and at peak efficiency.
  • Keep software up-to-date. You don’t need to be on the cutting edge, but falling too far behind can cause you more problems and leave you vulnerable to attacks.
  • Define a password policy and disable old employee accounts. These two best practices are easy to overlook, but the results of negligence can be disastrous, leaving the door open for hostile hackers and disgruntled former employees.

Secure Your Digital Borders

The 2013 Data Breach Investigations Report from Verizon found 68% of attacks required very little skill on the part of attackers. This means that most networks are vulnerable to simple hacks by opportunistic individuals. With so many boxes to check and settings to configure, it’s easy to overlook minor flaws that create big security holes.

Experts can help you close the back doors that hurried employees or loose security guidelines leave open. In the end, the cost of an attack, measured in lost data or downtime, is much higher than the cost of a secure infrastructure.

Plan for Failure

Developing an IT Disaster Recovery Plan ensures your business can get back to work as quickly as possible after a service interruption, natural disaster, hardware failure, or anything cyberspace can throw at you. Make your IT DRP part of a larger, comprehensive Business Continuity Plan and you’ll be ready for anything. To start developing an IT DRP, follow these steps.

  • Gather stakeholders from various departments to determine which systems, software and data they must have to operate.
  • Assign priority levels to the most critical systems. You may want to consider generators that can provide power during storms or utilizing an off-site, secure data center.
  • Estimate the amount of time it will take to restore offline systems after an outage.
  • Test and reassess your IT DRP yearly or quarterly, depending on your business needs, to account for changes and updates to systems.

Enjoy the Benefits

You may not find your business in the path of a hurricane or tornado tomorrow, but your systems are vulnerable to attacks in ways that your physical structures and employees are not. IT DRP prepares you to deal with data failures, hacking, connectivity outages, theft, and a host of other IT-specific threats and crises.

Avoid the high cost of IT infrastructure failures by investing in a solid plan today.

Lilly Harris CEO MSA, Inc.

Lilly Harris
CEO
MSA, Inc.

Lilly Harris is the President and CEO of Man-Machine Systems Assessment. MSA is an Economically Disadvantaged Woman-Owned Small Business with 23 years of government contracting experience. MSA is passionate about our Warfighters and the preparedness of our nation. MSA works diligently to evaluate defense systems, ensure continuity of operations and support mission critical programs that are aligned with our passion and mission. 

Visit: www.msaincorp.com

Follow: @MSAincorp