SlideShare a Scribd company logo
A Cybersecurity Planning Guide
for CFOs
Scams & Fraud, Developing a Plan,Tips, and Resources
Presented by André Nel, CPA
1
WHY IS DATA SECURITY CRITICAL?
Theft of digital information has become the most commonly reported
fraud, surpassing physical theft.
Customer and client information, payment information, personal files, bank
account details - all of this information is often impossible to replace if lost,
and dangerous in the hands of criminals.
Data lost due to disasters, such as a flood or fire, is devastating, but losing
it to hackers or a malware infection can have far greater consequences.
How you handle and protect your data is central to the security of your
business and the privacy expectations of customers, employees and
partners.
Things have changed!
Page 2
AGENDA FORTODAY
1. Scams and Fraud
2. Data Security – Developing an Action Plan
3. CybersecurityTips
4. Resources
Page 3
SCAMS AND FRAUD
New ways are developed by cyber criminals every day to victimize
your businesses, scam your customers, hurt your reputation and hold
you at ransom. The 2017 Verizon Data Breach Investigations Report
(DBIR) included the following summaries:
Page 4
SCAMS AND FRAUD (CONTINUED)
If you haven’t suffered a data breach you’ve either been incredibly
well prepared, or very, very lucky.Are you incredibly well prepared?
Page 5
WHAT ARE SOME OF THE MAIN CYBER
SCAMSTODAY?
Knowing which incident patterns affect your industry more often than
others do provide a building block for allocating cybersecurity resources.
These nine incident patterns have been identified in the DBIR:
1. Insider and privilege misuse – trusted actors leveraging logical and/or
physical access in an inappropriate or malicious manner.
2. Cyber-espionage – targeted attacks from external actors hunting for
sensitive internal data and trade secrets.
3. Web application attacks – web-application-related stolen credentials or
vulnerability exploits.
4. Crimeware – malware incidents, typically opportunistic and financially
motivated in nature (e.g., bankingTrojans, ransomware).
Page 6
WHAT ARE SOME OF THE MAIN CYBER
SCAMSTODAY? (CONTINUED)
5. Point-of-sale (POS) intrusions – attacks on POS environments leading
to payment card data disclosure.
6. Denial of service (DoS) attacks – non-breach related attacks affecting
business operations.
7. Payment card skimmers – physical tampering of ATMs and fuel-pump
terminals.
8. Physical theft and loss – physical loss or theft of data or IT-related
assets.
9. Miscellaneous errors – an error directly causing data loss.
Page 7
QUESTIONS AND COMMENTS
Any questions or experiences to share with the group before we move on
to the next item on the agenda?
Page 8
AGENDA FORTODAY
1. Scams and fraud
2. Data security – Developing an Action plan
3. CybersecurityTips
4. Resources
Page 9
CYBER SECURITY ACTION PLAN
The six steps in developing your cybersecurity action plan:
1. Conduct an inventory of all data you have.
2. Once you've identified your data, keep a record of its location
and move it to more appropriate locations as needed.
3. Develop a privacy policy.
4. Protect data collected on the Internet.
5. Create layers of security.
6. Plan for data loss or theft.
Page 10
STEP 1 – CONDUCT AN INVENTORY OF
ALL DATA
1. What kind of data do you have in your business?
• Customer data
• Employee information
• Proprietary and sensitive business information
2. How is that data handled and protected?
• Where is this data stored?
• What happens when the data is used or moved to a
different location?
3. Who has access to that data?
• Who has rights to access that data?
• How will the access privileges be managed?
Page 11
STEP 2 - KEEP A RECORD OFWHERE DATA
IS LOCATED
Record the location of data. Keep in mind that the same data could
be located in more than one location.
1. Location could include:
• Local or desktop computer
• Central file server
• Cloud
• Mobile devices such as USB memory stick
• Smartphones
2. Consider moving it to a more appropriate location.
Page 12
STEP 3 – DEVELOP A PRIVACY POLICY
Your privacy policy is a pledge to your customers that you will use
and protect their information in ways that they expect and that
adhere to your legal obligations.
1. Create your privacy policy with care.
2. Growing number of regulations protecting customer and
employee privacy.
• There are costly penalties if you do not comply
• You will be held accountable for what you claim and offer in
your policy
3. Share your policy, rules and expectations with all employees.
• There is a growing trend to post privacy policies on
company websites
4. Policy should address the following types of data:
• Personally Identifiable information
• Personal Health Information
• Customer Information
Page 13
STEP 4 – PROTECT DATA COLLECTED ON
THE INTERNET
Your website can be a great place to collect information, but that
comes with a responsibility to protect that data.
1. Data collected can include:
• Transactions and payment information
• Newsletter sign-ups
• Online inquiries
• Customer requests or orders
2. Data collected from your website can be stored in different
places.
• When you host your own website, it may be stored on your
own servers
• When hosted by a third party be sure that party protects
that data fully
3. That protection includes protection from:
• Hackers and outsiders
• Employees of the hosting company
Page 14
STEP 5 – CREATE LAYERS OF SECURITY
The idea of layering security is simple: You cannot and should not
rely on just one security mechanism – such as a password – to
protect something sensitive. If that security mechanism fails, you have
nothing left to protect you.
1. Classify your data:
• HIGHLY CONFIDENTIAL
• SENSITIVE
• INTERNAL USE ONLY
2. Control access to your data.
3. Secure your data:
• Passwords – Random, complex and long
• Encryption
4. Back up your data.
• Put a policy in place that specify what data is backed up,
how often, who is responsible, how and where backups are
stored and who has access.
• Physical media used to store data is vulnerable, so make
sure it is encrypted.
Page 15
STEP 6 – PLAN FOR DATA RECOVERY AFTER
A LOSS OR THEFT
Plan for the unexpected, including the loss or theft of data.
1. Be prepared for a rapid and coordinated response to any loss or
theft of data.
2. Employees and contractors should understand that they should
report any loss or theft to the appropriate company official.
3. Test your data recovery from backup systems on a regular basis.
Page 16
CYBER SECURITY ACTION PLAN
Let’s recap the six steps in developing your cybersecurity action
plan:
1. Conduct an inventory of all data you have.
2. Once you've identified your data, keep a record of its location
and move it to more appropriate locations as needed.
3. Develop a privacy policy.
4. Protect data collected on the Internet.
5. Create layers of security.
6. Plan for data loss or theft.
Page 17
QUESTIONS AND COMMENTS
Any questions or experiences to share with the group before we move on
to the next item on the agenda?
Page 18
AGENDA FORTODAY
1. Scams and
2. Data security – Developing an Action plan
3. CybersecurityTips
4. Resources
Page 19
CYBERSECURITYTIPS
1. Don’t ever say “It won’t happen to me.”
2. Train employees in security principles.
Establish basic security practices and policies for employees,
such as requiring strong passwords and establish appropriate
Internet use guidelines, that detail penalties for violating
company cybersecurity policies. Establish rules of behavior
describing how to handle and protect customer information and
other vital data.
3. Always be careful when clicking on attachments or links
in email.
If it’s unexpected or suspicious for any reason, don’t click on it.
Double check the URL of the website the link takes you to; bad
actors will often take advantage of spelling mistakes to direct
you to a harmful domain.
Page 20
CYBERSECURITYTIPS (CONTINUED)
4. Watch what you’re sharing on social networks.
Criminals can befriend you and easily gain access to a shocking
amount of information—where you go to school, where you
work, when you’re on vacation—that could help them gain
access to more valuable data.
5. Offline, be wary of social engineering, where someone
attempts to gain information from you through
manipulation.
If someone calls or emails you asking for sensitive information,
it’s okay to say no. You can always call the company directly to
verify credentials before giving out any information.
Page 21
CYBERSECURITYTIPS (CONTINUED)
6. Protect information, computers, and networks
from cyber attacks.
Keep clean machines: having the latest security software, web
browser, and operating system are the best defenses against
viruses, malware, and other online threats. Set antivirus software
to run a scan after each update. Install other key software
updates as soon as they are available.
7. Provide firewall security for your Internet connection.
A firewall is a set of related programs that prevent outsiders
from accessing data on a private network. Make sure the
operating system’s firewall is enabled or install free firewall
software available online. If employees work from home, ensure
that their home systems are protected by a firewall.
Page 22
CYBERSECURITYTIPS (CONTINUED)
8. Create a mobile device action plan.
Mobile devices can create significant security
and management challenges, especially if they hold confidential
information or can access the corporate network. Require users
to password protect their devices, encrypt their data, and install
security apps to prevent criminals from stealing information
while the phone is on public networks. Be sure to set reporting
procedures for lost or stolen equipment.
9. Make backup copies of important business data and
information.
Regularly backup the data on all computers. Critical data
includes word processing documents, electronic spreadsheets,
databases, financial files, human resources files, and accounts
receivable/payable files. Backup data automatically if possible, or
at least weekly and store the copies either offsite or in the
cloud.
Page 23
CYBERSECURITYTIPS (CONTINUED)
10. Control physical access to your computers and
create user accounts for each employee.
Prevent access or use of business computers by unauthorized
individuals. Laptops can be particularly easy targets for theft or
can be lost, so lock them up when unattended. Make sure a
separate user account is created for each employee and require
strong passwords. Administrative privileges should only be given
to trusted IT staff and key personnel.
11. Secure yourWi-Fi networks.
If you have a Wi-Fi network for your workplace, make sure it is
secure, encrypted, and hidden. To hide your Wi-Fi network, set
up your wireless access point or router so it does not broadcast
the network name, known as the Service Set Identifier (SSID).
Password protect access to the router.
Page 24
CYBERSECURITYTIPS (CONTINUED)
12. Employ best practices on payment cards.
Work with banks or processors to ensure the most trusted and
validated tools and anti-fraud services are being used. You may
also have additional security obligations pursuant to agreements
with your bank or processor. Isolate payment systems from
other, less secure programs and don’t use the same computer to
process payments and surf the Internet.
13. Limit employee access to data and information, and
limit authority to install software.
Do not provide any one employee with access to all data
systems. Employees should only be given access to the specific
data systems that they need for their jobs, and should not be
able to install any software without permission.
Page 25
CYBERSECURITYTIPS (CONTINUED)
14. Passwords and authentication.
Require employees to use unique passwords and change
passwords every three months. Consider implementing
multifactor authentication that requires additional information
beyond a password to gain entry. Check with your vendors that
handle sensitive data, especially financial institutions, to see if
they offer multifactor authentication for your account.
15. Be sure to monitor your accounts for any suspicious
activity.
If you see something unfamiliar, it could be a sign that you’ve
been compromised.
Page 26
CYBERSECURITYTIPS (CONTINUED)
16. Identify a senior-level employee or qualified third
party to lead your firm’s cybersecurity program.
17. Examine your insurance policies to ensure adequate
cyber coverage levels.
Page 27
HOW CAN GPP HELPYOU?
Don’t feel as though you need to come up with cyber strategies on
your own. We are experienced in providing comments on control
related matters to management. In addition, as a member of the
BDO Alliance USA, we have access to resources that can help your
organization as you navigate the cybersecurity risk and compliance
landscape, including:
• Guidance on conducting a cyber risk assessment
• How to take inventory of your sensitive information
• Develop and implement an incident response plan
Page 28
RESOURCES, REFERENCES AND CREDITS
Page 29
1. Federal Communications Commission (FCC)
i. https://www.fcc.gov/cyberplanner
ii. https://apps.fcc.gov/edocs_public/attachmatch/DOC-
343096A1.pdf
iii. https://apps.fcc.gov/edocs_public/attachmatch/DOC-
306595A1.pdf
2. 2017Verizon Data Breach Investigations Report (DBIR)
http://www.verizonenterprise.com/verizon-insights-
lab/dbir/2017/
QUESTIONS AND COMMENTS?
André Nel
(214)-635-2607
anel@gppcpa.com
Page 30
If you have any questions please
feel free to contact André Nel
at:
(214)-635-2607
anel@gppcpa.com

More Related Content

PDF
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
PDF
Overview of Information Security & Privacy
PDF
Information security
PPTX
Awareness Training on Information Security
PDF
The importance of information security
PPTX
Network Security - What Every Business Needs to Know
PPTX
Data breach
PPTX
Cyber Security Predictions 2016
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Overview of Information Security & Privacy
Information security
Awareness Training on Information Security
The importance of information security
Network Security - What Every Business Needs to Know
Data breach
Cyber Security Predictions 2016

What's hot (19)

PPT
Information security in todays world
PPTX
Network Security of Data Protection
PPTX
Information Security vs IT - Key Roles & Responsibilities
PDF
8 - Securing Info Systems
PPSX
Best Practices For Information Security Management 2011
PPSX
Security Awareness Training
PPTX
Internet safety and you
PPTX
Cybersecurity training seminars, courses, cybersecurity laws
PPTX
INFORMATION SECURITY
PPTX
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
PPTX
Network security
PDF
Using international standards to improve Asia-Pacific cyber security
PDF
Cybersecurity tips for employees
DOCX
Chapter 8 securing information systems MIS
PPTX
Cybersecurity for the non-technical
PPTX
Cybersecurity Awareness Session by Adam
PPTX
Information security / Cyber Security ppt
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PDF
Security/Compliance - Advanced Threat Detection and Compliance
Information security in todays world
Network Security of Data Protection
Information Security vs IT - Key Roles & Responsibilities
8 - Securing Info Systems
Best Practices For Information Security Management 2011
Security Awareness Training
Internet safety and you
Cybersecurity training seminars, courses, cybersecurity laws
INFORMATION SECURITY
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Network security
Using international standards to improve Asia-Pacific cyber security
Cybersecurity tips for employees
Chapter 8 securing information systems MIS
Cybersecurity for the non-technical
Cybersecurity Awareness Session by Adam
Information security / Cyber Security ppt
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Security/Compliance - Advanced Threat Detection and Compliance
Ad

Similar to A Cybersecurity Planning Guide for CFOs (20)

PDF
best coffee beans in the world, americano
PDF
1. introduction to cyber security
PDF
Are you the next target?
PDF
Small Business Administration Recommendations
PDF
How to Secure Data Privacy in 2024.pdf
PPTX
How to Secure Data Privacy in 2024.pptx
PPTX
6 Biggest Cyber Security Risks and How You Can Fight Back
PDF
2014 ota databreach3
PPT
Information Technology Security Basics
PPTX
Cyberattacks.pptx
PDF
Bridging the Data Security Gap
PDF
Best Practices to Secure Your Digital Assets.pdf
PDF
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
PPTX
Cyber Security Seminar
PDF
Cyber Security The Essential Guide to Keeping Your Data Safe.pdf
PPTX
Cyber Security for Financial Planners
PDF
mobile_security best practices and protection
PDF
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
PPTX
Gain Visibility & Control of IT Assets in a Perimeterless World
PPTX
Security and privacy in cloud computing.pptx
best coffee beans in the world, americano
1. introduction to cyber security
Are you the next target?
Small Business Administration Recommendations
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pptx
6 Biggest Cyber Security Risks and How You Can Fight Back
2014 ota databreach3
Information Technology Security Basics
Cyberattacks.pptx
Bridging the Data Security Gap
Best Practices to Secure Your Digital Assets.pdf
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Cyber Security Seminar
Cyber Security The Essential Guide to Keeping Your Data Safe.pdf
Cyber Security for Financial Planners
mobile_security best practices and protection
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Gain Visibility & Control of IT Assets in a Perimeterless World
Security and privacy in cloud computing.pptx
Ad

More from gppcpa (20)

PDF
The Hazards of Unpaid Payroll Taxes
PPTX
CFO Half-Day Conference
PPTX
Blockchain and Cybersecurity
PPTX
Surviving a Refundable Credit Due Diligence Audit
PPTX
Build Homes, Not Your Tax Bills: How the new tax law impacts home builders
PPTX
The IRS Passport Revocation For Unpaid Taxes: A Primer
PPTX
The Impact of the Tax Cuts & Jobs Act on High Tax Bracket Individuals - Show ...
PPTX
Tax Reform Update for Businesses and Individuals
PPTX
The New Tax Law: Here's What You Should Know
PPTX
International Tax Reform - Tax Cuts and Jobs Act of 2017
PPTX
Financial Strategies for 2018 for Foreign Investors
PPTX
Alternatives to IRS Enforced Collections - Installment Agreements and Account...
PPTX
What Every Business Owner Needs to Know About Selling a Business
PPTX
Occupational Fraud and Electronic Evidence Investigations
PPTX
Subchapter S Corporations & Estates Trusts as Shareholders
PPTX
Occupational Fraud - What Dentists Need to Know
PPTX
Are your medical office practices putting you at risk for a lawsuit?
PDF
Reporting Requirements for US Citizens with Foreign Assets
PPTX
Us tax presentation
PPTX
Divorce & Estates: Tax and Other Financial Considerations
The Hazards of Unpaid Payroll Taxes
CFO Half-Day Conference
Blockchain and Cybersecurity
Surviving a Refundable Credit Due Diligence Audit
Build Homes, Not Your Tax Bills: How the new tax law impacts home builders
The IRS Passport Revocation For Unpaid Taxes: A Primer
The Impact of the Tax Cuts & Jobs Act on High Tax Bracket Individuals - Show ...
Tax Reform Update for Businesses and Individuals
The New Tax Law: Here's What You Should Know
International Tax Reform - Tax Cuts and Jobs Act of 2017
Financial Strategies for 2018 for Foreign Investors
Alternatives to IRS Enforced Collections - Installment Agreements and Account...
What Every Business Owner Needs to Know About Selling a Business
Occupational Fraud and Electronic Evidence Investigations
Subchapter S Corporations & Estates Trusts as Shareholders
Occupational Fraud - What Dentists Need to Know
Are your medical office practices putting you at risk for a lawsuit?
Reporting Requirements for US Citizens with Foreign Assets
Us tax presentation
Divorce & Estates: Tax and Other Financial Considerations

Recently uploaded (20)

PDF
Unit 1 Cost Accounting - Cost sheet
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
A Brief Introduction About Julia Allison
PDF
Lecture 3 - Risk Management and Compliance.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPTX
Starting the business from scratch using well proven technique
PPTX
sales presentation، Training Overview.pptx
PPT
Chapter four Project-Preparation material
PPTX
DMT - Profile Brief About Business .pptx
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
DOCX
Euro SEO Services 1st 3 General Updates.docx
PPT
Data mining for business intelligence ch04 sharda
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PPTX
5 Stages of group development guide.pptx
Unit 1 Cost Accounting - Cost sheet
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
A Brief Introduction About Julia Allison
Lecture 3 - Risk Management and Compliance.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
MSPs in 10 Words - Created by US MSP Network
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Power and position in leadershipDOC-20250808-WA0011..pdf
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Starting the business from scratch using well proven technique
sales presentation، Training Overview.pptx
Chapter four Project-Preparation material
DMT - Profile Brief About Business .pptx
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Euro SEO Services 1st 3 General Updates.docx
Data mining for business intelligence ch04 sharda
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
5 Stages of group development guide.pptx

A Cybersecurity Planning Guide for CFOs

  • 1. A Cybersecurity Planning Guide for CFOs Scams & Fraud, Developing a Plan,Tips, and Resources Presented by André Nel, CPA 1
  • 2. WHY IS DATA SECURITY CRITICAL? Theft of digital information has become the most commonly reported fraud, surpassing physical theft. Customer and client information, payment information, personal files, bank account details - all of this information is often impossible to replace if lost, and dangerous in the hands of criminals. Data lost due to disasters, such as a flood or fire, is devastating, but losing it to hackers or a malware infection can have far greater consequences. How you handle and protect your data is central to the security of your business and the privacy expectations of customers, employees and partners. Things have changed! Page 2
  • 3. AGENDA FORTODAY 1. Scams and Fraud 2. Data Security – Developing an Action Plan 3. CybersecurityTips 4. Resources Page 3
  • 4. SCAMS AND FRAUD New ways are developed by cyber criminals every day to victimize your businesses, scam your customers, hurt your reputation and hold you at ransom. The 2017 Verizon Data Breach Investigations Report (DBIR) included the following summaries: Page 4
  • 5. SCAMS AND FRAUD (CONTINUED) If you haven’t suffered a data breach you’ve either been incredibly well prepared, or very, very lucky.Are you incredibly well prepared? Page 5
  • 6. WHAT ARE SOME OF THE MAIN CYBER SCAMSTODAY? Knowing which incident patterns affect your industry more often than others do provide a building block for allocating cybersecurity resources. These nine incident patterns have been identified in the DBIR: 1. Insider and privilege misuse – trusted actors leveraging logical and/or physical access in an inappropriate or malicious manner. 2. Cyber-espionage – targeted attacks from external actors hunting for sensitive internal data and trade secrets. 3. Web application attacks – web-application-related stolen credentials or vulnerability exploits. 4. Crimeware – malware incidents, typically opportunistic and financially motivated in nature (e.g., bankingTrojans, ransomware). Page 6
  • 7. WHAT ARE SOME OF THE MAIN CYBER SCAMSTODAY? (CONTINUED) 5. Point-of-sale (POS) intrusions – attacks on POS environments leading to payment card data disclosure. 6. Denial of service (DoS) attacks – non-breach related attacks affecting business operations. 7. Payment card skimmers – physical tampering of ATMs and fuel-pump terminals. 8. Physical theft and loss – physical loss or theft of data or IT-related assets. 9. Miscellaneous errors – an error directly causing data loss. Page 7
  • 8. QUESTIONS AND COMMENTS Any questions or experiences to share with the group before we move on to the next item on the agenda? Page 8
  • 9. AGENDA FORTODAY 1. Scams and fraud 2. Data security – Developing an Action plan 3. CybersecurityTips 4. Resources Page 9
  • 10. CYBER SECURITY ACTION PLAN The six steps in developing your cybersecurity action plan: 1. Conduct an inventory of all data you have. 2. Once you've identified your data, keep a record of its location and move it to more appropriate locations as needed. 3. Develop a privacy policy. 4. Protect data collected on the Internet. 5. Create layers of security. 6. Plan for data loss or theft. Page 10
  • 11. STEP 1 – CONDUCT AN INVENTORY OF ALL DATA 1. What kind of data do you have in your business? • Customer data • Employee information • Proprietary and sensitive business information 2. How is that data handled and protected? • Where is this data stored? • What happens when the data is used or moved to a different location? 3. Who has access to that data? • Who has rights to access that data? • How will the access privileges be managed? Page 11
  • 12. STEP 2 - KEEP A RECORD OFWHERE DATA IS LOCATED Record the location of data. Keep in mind that the same data could be located in more than one location. 1. Location could include: • Local or desktop computer • Central file server • Cloud • Mobile devices such as USB memory stick • Smartphones 2. Consider moving it to a more appropriate location. Page 12
  • 13. STEP 3 – DEVELOP A PRIVACY POLICY Your privacy policy is a pledge to your customers that you will use and protect their information in ways that they expect and that adhere to your legal obligations. 1. Create your privacy policy with care. 2. Growing number of regulations protecting customer and employee privacy. • There are costly penalties if you do not comply • You will be held accountable for what you claim and offer in your policy 3. Share your policy, rules and expectations with all employees. • There is a growing trend to post privacy policies on company websites 4. Policy should address the following types of data: • Personally Identifiable information • Personal Health Information • Customer Information Page 13
  • 14. STEP 4 – PROTECT DATA COLLECTED ON THE INTERNET Your website can be a great place to collect information, but that comes with a responsibility to protect that data. 1. Data collected can include: • Transactions and payment information • Newsletter sign-ups • Online inquiries • Customer requests or orders 2. Data collected from your website can be stored in different places. • When you host your own website, it may be stored on your own servers • When hosted by a third party be sure that party protects that data fully 3. That protection includes protection from: • Hackers and outsiders • Employees of the hosting company Page 14
  • 15. STEP 5 – CREATE LAYERS OF SECURITY The idea of layering security is simple: You cannot and should not rely on just one security mechanism – such as a password – to protect something sensitive. If that security mechanism fails, you have nothing left to protect you. 1. Classify your data: • HIGHLY CONFIDENTIAL • SENSITIVE • INTERNAL USE ONLY 2. Control access to your data. 3. Secure your data: • Passwords – Random, complex and long • Encryption 4. Back up your data. • Put a policy in place that specify what data is backed up, how often, who is responsible, how and where backups are stored and who has access. • Physical media used to store data is vulnerable, so make sure it is encrypted. Page 15
  • 16. STEP 6 – PLAN FOR DATA RECOVERY AFTER A LOSS OR THEFT Plan for the unexpected, including the loss or theft of data. 1. Be prepared for a rapid and coordinated response to any loss or theft of data. 2. Employees and contractors should understand that they should report any loss or theft to the appropriate company official. 3. Test your data recovery from backup systems on a regular basis. Page 16
  • 17. CYBER SECURITY ACTION PLAN Let’s recap the six steps in developing your cybersecurity action plan: 1. Conduct an inventory of all data you have. 2. Once you've identified your data, keep a record of its location and move it to more appropriate locations as needed. 3. Develop a privacy policy. 4. Protect data collected on the Internet. 5. Create layers of security. 6. Plan for data loss or theft. Page 17
  • 18. QUESTIONS AND COMMENTS Any questions or experiences to share with the group before we move on to the next item on the agenda? Page 18
  • 19. AGENDA FORTODAY 1. Scams and 2. Data security – Developing an Action plan 3. CybersecurityTips 4. Resources Page 19
  • 20. CYBERSECURITYTIPS 1. Don’t ever say “It won’t happen to me.” 2. Train employees in security principles. Establish basic security practices and policies for employees, such as requiring strong passwords and establish appropriate Internet use guidelines, that detail penalties for violating company cybersecurity policies. Establish rules of behavior describing how to handle and protect customer information and other vital data. 3. Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you to; bad actors will often take advantage of spelling mistakes to direct you to a harmful domain. Page 20
  • 21. CYBERSECURITYTIPS (CONTINUED) 4. Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data. 5. Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information. Page 21
  • 22. CYBERSECURITYTIPS (CONTINUED) 6. Protect information, computers, and networks from cyber attacks. Keep clean machines: having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Set antivirus software to run a scan after each update. Install other key software updates as soon as they are available. 7. Provide firewall security for your Internet connection. A firewall is a set of related programs that prevent outsiders from accessing data on a private network. Make sure the operating system’s firewall is enabled or install free firewall software available online. If employees work from home, ensure that their home systems are protected by a firewall. Page 22
  • 23. CYBERSECURITYTIPS (CONTINUED) 8. Create a mobile device action plan. Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment. 9. Make backup copies of important business data and information. Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly and store the copies either offsite or in the cloud. Page 23
  • 24. CYBERSECURITYTIPS (CONTINUED) 10. Control physical access to your computers and create user accounts for each employee. Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key personnel. 11. Secure yourWi-Fi networks. If you have a Wi-Fi network for your workplace, make sure it is secure, encrypted, and hidden. To hide your Wi-Fi network, set up your wireless access point or router so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protect access to the router. Page 24
  • 25. CYBERSECURITYTIPS (CONTINUED) 12. Employ best practices on payment cards. Work with banks or processors to ensure the most trusted and validated tools and anti-fraud services are being used. You may also have additional security obligations pursuant to agreements with your bank or processor. Isolate payment systems from other, less secure programs and don’t use the same computer to process payments and surf the Internet. 13. Limit employee access to data and information, and limit authority to install software. Do not provide any one employee with access to all data systems. Employees should only be given access to the specific data systems that they need for their jobs, and should not be able to install any software without permission. Page 25
  • 26. CYBERSECURITYTIPS (CONTINUED) 14. Passwords and authentication. Require employees to use unique passwords and change passwords every three months. Consider implementing multifactor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data, especially financial institutions, to see if they offer multifactor authentication for your account. 15. Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised. Page 26
  • 27. CYBERSECURITYTIPS (CONTINUED) 16. Identify a senior-level employee or qualified third party to lead your firm’s cybersecurity program. 17. Examine your insurance policies to ensure adequate cyber coverage levels. Page 27
  • 28. HOW CAN GPP HELPYOU? Don’t feel as though you need to come up with cyber strategies on your own. We are experienced in providing comments on control related matters to management. In addition, as a member of the BDO Alliance USA, we have access to resources that can help your organization as you navigate the cybersecurity risk and compliance landscape, including: • Guidance on conducting a cyber risk assessment • How to take inventory of your sensitive information • Develop and implement an incident response plan Page 28
  • 29. RESOURCES, REFERENCES AND CREDITS Page 29 1. Federal Communications Commission (FCC) i. https://www.fcc.gov/cyberplanner ii. https://apps.fcc.gov/edocs_public/attachmatch/DOC- 343096A1.pdf iii. https://apps.fcc.gov/edocs_public/attachmatch/DOC- 306595A1.pdf 2. 2017Verizon Data Breach Investigations Report (DBIR) http://www.verizonenterprise.com/verizon-insights- lab/dbir/2017/
  • 30. QUESTIONS AND COMMENTS? André Nel (214)-635-2607 anel@gppcpa.com Page 30
  • 31. If you have any questions please feel free to contact André Nel at: (214)-635-2607 anel@gppcpa.com