SlideShare a Scribd company logo
Pg. 35


Dealership Technology

Erik Nachbahr
President
Helion Technologies
Top Dealership
 Technology
Threats in 2013
About Helion / Erik Nachbahr

• 15 years working with Auto Dealers

• 80 IT Professionals, many with BS and MS
  Computer Science degrees and advanced industry
  certifications

• 530+ Dealerships supported with 17,000+
  computers
Top Real-Time Dealer Threats

  •Federal Trade Commission Action

  •Business Software Alliance Lawsuits

  •Theft of Customer Information / Data Loss

 Downtime and Lost Productivity

 Legal / Financial Liability
Threats to Reputation



• The Dealership who’s
  customer data was stolen

• Dealership it not trustworthy

• Negative media coverage
Threats to Profitability

• Compromised systems / Systems down

• Stolen customer lists and personal information

• Bank Account Theft
FTC Action Against Dealers

• Based on Dealer’s lack of protection
  of customer data

• Dealers are financial institutions

• Dealers are extremely vulnerable to
  attack
P2P Software Threat

•   Typically used to share copyrighted music, videos
    and files

•   Installed by an employee on their PC

•   Automatically shares some or all of the computer’s
    files to the Internet

•   Legal liability and security risk but low on the list
    of threats
What do you risk?


 • Bad publicity

 • Theft of customer records

 • Shut down by FTC

 • Business disruption from failed computer systems
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
What is broken in Dealerships?

• Zero security on local
  computers

• No Central Control of
  systems

• Open Wireless

• DLP (Data Loss Prevention)
  applications not in use
What about




• Security Risk without proper Wi-Fi protections

• Productivity Drain potential

• Early-Adopter risk here
FTC Action Item # 1: Active Directory

• Deploy Windows Server Solution

• LOCK DOWN PCs

• Control Internet /
  network use by employee
FTC Action Item # 2: Wireless Control
• Update and Lock down wireless with WPA2
  Encryption

• Install a User-based
  Security or Firewall for Wireless

• Separate Customer wireless from corporate
  wireless
FTC Action Item # 3: Protection Systems

• Managed Computer security Patching

• Managed Antivirus
  Systems
FTC Action Item # 4: Policy


• Have a computer acceptable
  use policy

• All employees must execute and understand it

• Sample at:

  www.heliontechnologies.com/policy/use-sample
Erik Nachbahr "Dealership Technology"
Software Piracy

• 2010 US Piracy losses: $9.5 Billion

• 2010 US Piracy Rate: 20%

• 2013 Estimated Global Commercial Value
  of Pirated Software: $63.4 Billion

• Tremendous incentive to prevent piracy
Who enforces anti-
piracy laws?

 BSA
 (Business Software Alliance)

 Represents Microsoft, Apple, Adobe and others

 Has paid over $453,455 since 2008 in rewards to
 confidential informants
What is the BSA’s
Authority?


Not a law enforcement agency.

Uses civil litigation and
copyright law.

Pays “tipster rewards” of up to $200,000
Piracy Warning Signs


Microsoft Office 2003 or earlier in use

Custom Build / Home Built / “White Box” PCs

Internal IT Departments

Purchasing software licenses from the Internet
BSA Process


1. BSA Alleges piracy, demands self audit

2. Dealer performs self audit. Must provide invoices for all software
installed

3. BSA presents Dealer with demand (typically $3,000 x copies of
software unlicensed)
BSA Action Item :
Perform Self License
Assessment
Look for piracy warning signs

Document all software running on all
computers including invoices for all

Remove or purchase any software
without proper proof of purchase
Contact Information


         Erik Nachbahr

enachbahr@heliontechnologies.com

      Direct 443-610-7640

More Related Content

PDF
Protecting Your Business from Unauthorized IBM i Access
PDF
Hem infotech company profile
PPTX
IBM Security intelligence v1 - ahmed el nahas
PDF
Cybersecurity
PPT
Litchfield County Computer – An Introduction
PPT
PPTX
Mobile First, Security First!
PDF
Network and Endpoint Security v1.0 (2017)
Protecting Your Business from Unauthorized IBM i Access
Hem infotech company profile
IBM Security intelligence v1 - ahmed el nahas
Cybersecurity
Litchfield County Computer – An Introduction
Mobile First, Security First!
Network and Endpoint Security v1.0 (2017)

What's hot (19)

DOCX
Chapter 8 securing information systems MIS
PDF
8 - Securing Info Systems
PPT
Maloney Slides
PDF
Technology & Life Science Practice, FailSafe Overview
PPTX
Session#7; securing information systems
PPTX
What every executive needs to know about information technology security
PDF
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
PPTX
Data Breaches: Is IBM i Really at Risk?
PDF
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
PDF
IOT & BYOD – The New Security Risks (v1.1)
PPT
22 need-for-security
PPTX
Security & control in mis
PPT
Securing information systems
PPT
Ibm q radar_blind_references
PDF
BYOD risk management best practices
PPT
Security & control in management information system
PDF
PPTX
Week 12
PPT
Commercial And Government Cyberwarfare
Chapter 8 securing information systems MIS
8 - Securing Info Systems
Maloney Slides
Technology & Life Science Practice, FailSafe Overview
Session#7; securing information systems
What every executive needs to know about information technology security
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
Data Breaches: Is IBM i Really at Risk?
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
IOT & BYOD – The New Security Risks (v1.1)
22 need-for-security
Security & control in mis
Securing information systems
Ibm q radar_blind_references
BYOD risk management best practices
Security & control in management information system
Week 12
Commercial And Government Cyberwarfare
Ad

Viewers also liked (20)

PDF
ملف العلاقات السرية بين جماعة الإخوان المسلمين بأمريكا وحلفائها ا لحلقة الأولى
PDF
Evaluation of as media
PPTX
PPTX
Constructivism - Erika Queen
PDF
Brochure SVT English
PDF
ايات للحقظ البابا شنوده لثالث
PDF
Electro-Thermal and Semiconductivity Behaviour of Natural Sintered Complex Ca...
PPTX
Evaluation 3
PPTX
Tools and practices for rapid application development
PDF
Microsoft Power Point Brett Campbellv2 [Compatibility Mode]
DOCX
Giaoanbai30
PDF
Ozel egitim-video
PDF
ARC 404/504 Presentation
PDF
Human body قيمه الجسد الإنسانى فى المسيحه
PDF
Ozel pilot-okulu
PPTX
Hebrew Kings
PDF
Agamben a geniusz
PPT
Unit 4
DOCX
Peresmian kelas honda
PPT
Sir chris odonnel
ملف العلاقات السرية بين جماعة الإخوان المسلمين بأمريكا وحلفائها ا لحلقة الأولى
Evaluation of as media
Constructivism - Erika Queen
Brochure SVT English
ايات للحقظ البابا شنوده لثالث
Electro-Thermal and Semiconductivity Behaviour of Natural Sintered Complex Ca...
Evaluation 3
Tools and practices for rapid application development
Microsoft Power Point Brett Campbellv2 [Compatibility Mode]
Giaoanbai30
Ozel egitim-video
ARC 404/504 Presentation
Human body قيمه الجسد الإنسانى فى المسيحه
Ozel pilot-okulu
Hebrew Kings
Agamben a geniusz
Unit 4
Peresmian kelas honda
Sir chris odonnel
Ad

Similar to Erik Nachbahr "Dealership Technology" (20)

PDF
Meeting the Cybersecurity Challenge
PDF
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
PPTX
How US Cybersecurity Executive Order Impacts IBM i Customers
PPTX
IBM i Security SIEM Integration
PPTX
Are You Prepared For a Data Breach
PDF
Using international standards to improve US cybersecurity
PPTX
Lock it Down: Access Control for IBM i
PPT
Data Protection, Humans and Common Sense
PPTX
Chapter 5 - Digital Security, Ethics, Privacy.pptx
PPTX
Addressing the Data Security Risks of Cloud-Based Software
PPTX
Security For Business: Are You And Your Customers Safe
PPTX
Frontier Backupand Recovery Presentation 110311
PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PPTX
IT & Network Security Awareness
PDF
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
PPTX
The Basics of Cyber Insurance
PPTX
iGCSE Theory Unit 6 – Effects of Using ICT
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Meeting the Cybersecurity Challenge
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
How US Cybersecurity Executive Order Impacts IBM i Customers
IBM i Security SIEM Integration
Are You Prepared For a Data Breach
Using international standards to improve US cybersecurity
Lock it Down: Access Control for IBM i
Data Protection, Humans and Common Sense
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Addressing the Data Security Risks of Cloud-Based Software
Security For Business: Are You And Your Customers Safe
Frontier Backupand Recovery Presentation 110311
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Improve IT Security and Compliance with Mainframe Data in Splunk
IT & Network Security Awareness
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
The Basics of Cyber Insurance
iGCSE Theory Unit 6 – Effects of Using ICT
IoT Security: Debunking the "We Aren't THAT Connected" Myth

More from Sean Bradley (20)

PPTX
IS20G15 - (Almost) Everything I Learned About Leadership, I Learned From My D...
PPTX
IS20G15 - Top PPC Strategies That Work On Any Budget - Mark Irvine
PPTX
IS20G15 - 10th Annual Automotive Customer Experience (CX) Trends Study Result...
PPTX
IS20G15 - Two Doggies, A Giraffe, & A Crocodile: How Our Mind Entangles Succe...
PPTX
IS20G15 - How To Generate High-Quality & Cost Effective Traffic by Utilizing ...
PPTX
IS20G15 - Credit Strategies To Be A Credit Master - Bob Lettis
PPTX
IS20G15 - Positioned For Growth™: A Proven Strategy to Modernize Your Busines...
PPTX
IS20G15 - State of the Subprime Consumer - Trends & Insights - David Bennett
PPTX
IS20G15 - Internet & Phones Are The New Showroom - Sean V. Bradley, CSP
PPTX
IS20G15 - Lights, Camera, Traction! Closing More Deals with the Power of Vide...
PPTX
IS20G15 - Leveraging Customer Intelligence_ Revolutionizing Automotive Custom...
PPTX
IS20G15 - Vehicle Lifecycle Management is the Next Horizon, Are You Ready? - ...
PPTX
IS20G15 - How To Be Marvelous At Automotive SEO - Greg Gifford
PPTX
Sean V. Bradley: The NEW Road To The Sale
PPTX
Sean V. Bradley: Turn Your CRM Into an ATM
PPTX
NADA 2024: Selling Cars on TikTok
PPTX
NADA 2024: Proven Tactics and Tips from a Top Sales Performer
PPTX
Sean V. Bradley - Digital Dealer 2023
PPTX
Digital Dealer Tampa May 2023 (Crissy & Tianna)
PPTX
MasterClass - How to Properly Qualify & Utilize a Needs Assessment Worksheet
IS20G15 - (Almost) Everything I Learned About Leadership, I Learned From My D...
IS20G15 - Top PPC Strategies That Work On Any Budget - Mark Irvine
IS20G15 - 10th Annual Automotive Customer Experience (CX) Trends Study Result...
IS20G15 - Two Doggies, A Giraffe, & A Crocodile: How Our Mind Entangles Succe...
IS20G15 - How To Generate High-Quality & Cost Effective Traffic by Utilizing ...
IS20G15 - Credit Strategies To Be A Credit Master - Bob Lettis
IS20G15 - Positioned For Growth™: A Proven Strategy to Modernize Your Busines...
IS20G15 - State of the Subprime Consumer - Trends & Insights - David Bennett
IS20G15 - Internet & Phones Are The New Showroom - Sean V. Bradley, CSP
IS20G15 - Lights, Camera, Traction! Closing More Deals with the Power of Vide...
IS20G15 - Leveraging Customer Intelligence_ Revolutionizing Automotive Custom...
IS20G15 - Vehicle Lifecycle Management is the Next Horizon, Are You Ready? - ...
IS20G15 - How To Be Marvelous At Automotive SEO - Greg Gifford
Sean V. Bradley: The NEW Road To The Sale
Sean V. Bradley: Turn Your CRM Into an ATM
NADA 2024: Selling Cars on TikTok
NADA 2024: Proven Tactics and Tips from a Top Sales Performer
Sean V. Bradley - Digital Dealer 2023
Digital Dealer Tampa May 2023 (Crissy & Tianna)
MasterClass - How to Properly Qualify & Utilize a Needs Assessment Worksheet

Erik Nachbahr "Dealership Technology"

  • 1. Pg. 35 Dealership Technology Erik Nachbahr President Helion Technologies
  • 3. About Helion / Erik Nachbahr • 15 years working with Auto Dealers • 80 IT Professionals, many with BS and MS Computer Science degrees and advanced industry certifications • 530+ Dealerships supported with 17,000+ computers
  • 4. Top Real-Time Dealer Threats •Federal Trade Commission Action •Business Software Alliance Lawsuits •Theft of Customer Information / Data Loss  Downtime and Lost Productivity  Legal / Financial Liability
  • 5. Threats to Reputation • The Dealership who’s customer data was stolen • Dealership it not trustworthy • Negative media coverage
  • 6. Threats to Profitability • Compromised systems / Systems down • Stolen customer lists and personal information • Bank Account Theft
  • 7. FTC Action Against Dealers • Based on Dealer’s lack of protection of customer data • Dealers are financial institutions • Dealers are extremely vulnerable to attack
  • 8. P2P Software Threat • Typically used to share copyrighted music, videos and files • Installed by an employee on their PC • Automatically shares some or all of the computer’s files to the Internet • Legal liability and security risk but low on the list of threats
  • 9. What do you risk? • Bad publicity • Theft of customer records • Shut down by FTC • Business disruption from failed computer systems
  • 13. What is broken in Dealerships? • Zero security on local computers • No Central Control of systems • Open Wireless • DLP (Data Loss Prevention) applications not in use
  • 14. What about • Security Risk without proper Wi-Fi protections • Productivity Drain potential • Early-Adopter risk here
  • 15. FTC Action Item # 1: Active Directory • Deploy Windows Server Solution • LOCK DOWN PCs • Control Internet / network use by employee
  • 16. FTC Action Item # 2: Wireless Control • Update and Lock down wireless with WPA2 Encryption • Install a User-based Security or Firewall for Wireless • Separate Customer wireless from corporate wireless
  • 17. FTC Action Item # 3: Protection Systems • Managed Computer security Patching • Managed Antivirus Systems
  • 18. FTC Action Item # 4: Policy • Have a computer acceptable use policy • All employees must execute and understand it • Sample at: www.heliontechnologies.com/policy/use-sample
  • 20. Software Piracy • 2010 US Piracy losses: $9.5 Billion • 2010 US Piracy Rate: 20% • 2013 Estimated Global Commercial Value of Pirated Software: $63.4 Billion • Tremendous incentive to prevent piracy
  • 21. Who enforces anti- piracy laws? BSA (Business Software Alliance) Represents Microsoft, Apple, Adobe and others Has paid over $453,455 since 2008 in rewards to confidential informants
  • 22. What is the BSA’s Authority? Not a law enforcement agency. Uses civil litigation and copyright law. Pays “tipster rewards” of up to $200,000
  • 23. Piracy Warning Signs Microsoft Office 2003 or earlier in use Custom Build / Home Built / “White Box” PCs Internal IT Departments Purchasing software licenses from the Internet
  • 24. BSA Process 1. BSA Alleges piracy, demands self audit 2. Dealer performs self audit. Must provide invoices for all software installed 3. BSA presents Dealer with demand (typically $3,000 x copies of software unlicensed)
  • 25. BSA Action Item : Perform Self License Assessment Look for piracy warning signs Document all software running on all computers including invoices for all Remove or purchase any software without proper proof of purchase
  • 26. Contact Information Erik Nachbahr enachbahr@heliontechnologies.com Direct 443-610-7640