5
Information Exposure www.m2powerinc.com 888.609.6828 [email protected] Responsibilities, Risks, and Rewards 1. ID Theft and Privacy 2. What Causes It 3. How To Reduce Your Company Liability/Responsibility

ID Theft Presentation to 12 Hrs Of Tech

Embed Size (px)

DESCRIPTION

Explaining ID Theft From a Behavior Approach

Citation preview

Page 1: ID Theft  Presentation to 12 Hrs Of Tech

Information Exposure

www.m2powerinc.com 888.609.6828 [email protected]

Responsibilities, Risks, and Rewards

1. ID Theft and Privacy 2. What Causes It3. How To Reduce Your Company Liability/Responsibility

Page 2: ID Theft  Presentation to 12 Hrs Of Tech

#1 Cause of Breaches

NegligenceLack of knowledgeLack of care72% Human related: Soft skills (Ponemon Institute 2010)

50% of ID theft happens from someone you know US Population prizes convenience over security: Achilles Heal making the US #1

target. New York # 8 in the world, #2 in the US.28% Cyber related (Ponemon Institute 2010)

#1 Cause: Lost or Stolen Data Laptops Smartphones/IPads Theft: Servers

Hacking Stealing on-site

Cyber jackingwww.m2powerinc.com 888.609.6828 [email protected]

Page 3: ID Theft  Presentation to 12 Hrs Of Tech

Drivers License

Medical Financial

Identity Theft is not just about Credit Cards and Credit Reports! Monitoring does not prevent ID Theft or Privacy Breaches.

Social Security

Character/ Criminal

8 Types of Identity Theft

Technology Public Files

Cloning

www.m2powerinc.com 888.609.6828 [email protected]

Page 4: ID Theft  Presentation to 12 Hrs Of Tech

How to Mitigate

Remember to be in compliance you must:

Adopt a culture of privacy thinking and expect others to adhere to the same Educate and be educated on an on-going basis and expect/ask the same of others Select someone with the responsibility to implement policies, procedures, and maintain vigilance Detect the potential for exposure and fix them Monitor potential for others Develop policies and procedures that encourage privacy and do business with others that support

the same. It may include business associate agreements, client privacy statements, Internet security policies, etc.

Implement vigilance. Check and update routinely to avoid obsolescence and reduce new exposures to threats. There is no such thing as fail safe, but “good practices” reduce potential for loss & liability if the business is out of business years later.

Prove It.

Adopt, Detect, Defend, Educate, Monitor, Mitigate, Be Vigilant and Prove It.

www.m2powerinc.com 888.609.6828 [email protected]

Page 5: ID Theft  Presentation to 12 Hrs Of Tech

How to Get started

How to get started: ww.apsa-eh.iddoctor.net Learn “How Naked You Are” and what you can do about it They offer a DYI approach that includes 160 page manual with videos,

templates, and support for $399. They offer more elaborate support for $599-$3900 depending upon the

complexities and size of the organization.

Take Charge: www.myiceshield.com Partner with key advisors Dictate who see what information and how Share with family

Contact me: Ester Horowitz 516 318-8655www.m2powerinc.com 888.609.6828 [email protected]