Cyber Security | Is Your Practice at Risk?

Page created by June Hoffman
 
CONTINUE READING
Cyber Security | Is Your Practice at Risk?
Cyber Security | Is Your Practice at Risk?

                              Laurance (Larry) Selnick, CTP | Webster Bank
Matt Kozloski, VCDX and CISSP VP, Professional Services | Kelser Corporation
      Larry Racioppo, SVP | Management & Professional Services (MPS) | USI
                                                                     2/22/17
Cyber Security | Is Your Practice at Risk?
Fraud Awareness Presentation | Discussion Today
  Setting the Stage

  Types of Fraud

  How to Mitigate Risk

                                                  2
Cyber Security | Is Your Practice at Risk?
Internet of Things | What is it?
  •   Internet of Things: A network of internet-connected objects able to collect and exchange
      data using embedded sensors

                                                                                                 3
Cyber Security | Is Your Practice at Risk?
Internet of Things | Web-Connected Devices
          Kitchen

                                  Living Room

                                                Kitchen

                                                          4
Cyber Security | Is Your Practice at Risk?
Internet of Things | Your Computer is a Connected Device
                                         The primary way that attackers compromise
                                         computers in the small office is through viruses
                                         that exploit vulnerabilities on the machine.

                                         A computer that has all of the latest security
                                         updates to its operating system and applications
                                         may still be at risk because of previously
                                         undetected flaws.

                                         Computers can become infected by seemingly
                                         innocent outside sources such as e-mail, flash
                                         drives, and web downloads.

                                         It is important to use a product that provides
                                         continuously updated protection against these
                                         exploits. Anti-virus software is a must.

                                                                                      5
Cyber Security | Is Your Practice at Risk?
Setting the Stage | As a      Business You Should Know…

“There has been a shift in the online criminal world from primarily targeting individuals
to increased targeting of corporations” (FS-ISAC)….a focus on smaller businesses!

Unlike consumers who enjoy strong federal protection, a business may be liable under
Uniform Commercial Code (UCC) rules (FS-ISAC)…it is a shared responsibility to
prevent fraud

                                                                                            6
Cyber Security | Is Your Practice at Risk?
Setting the Stage | No Business Too Small to Be Hacked

                                              Healthcare providers may believe that if
                                              they are small and low profile, they will
                                              escape the attentions of the “bad guys”
                                              who are running these attacks.

                                              Every day there are new attacks aimed
                                              specifically at small to mid-size
                                              organizations for the very reason that they
                                              are less likely to have fully protected
                                              themselves.

                                              Criminals have been highly successful at
                                              penetrating these smaller organizations,
                                              carrying out their activities while their
                                              unfortunate victims are unaware until it is
                                              too late.

                                                                                       7
Cyber Security | Is Your Practice at Risk?
Setting the Stage | Cyber Fraud is Now Part of the Norm

Reported at the annual meeting of the WSJ CIO Network

                    CIO’s accepted that being hacked was a given.
                          The question is how to react to it.”

                                                                    8
Cyber Security | Is Your Practice at Risk?
Setting the Stage | Not a Case of if, But When

  Nobody is ever 100% secure.

  The threat environment is simply moving too fast.

  Rather than bulletproof security, organizations need to focus on ways to make the cost
  of breaching their security more trouble than the data that could be obtained is worth
    ► using a layered, risk-based approach to maintain the balance between security

       and customer experience.

  41% of all data breaches are a result of criminal attack

                                                                          Source: Aite' RSA Study & First Data

                                                                                                     9
Cyber Security | Is Your Practice at Risk?
Setting the Stage | Not a Case of if, But When

  There was more malware found over the last 2 years than in the previous 10 years
  combined.

  Vulnerabilities Found in Three Quarters of Websites with Web administrators still
  struggle to stay current on patches. There were over one million web attacks against
  people each day in 2015.

  “Zero-day” attacks increased 50% in 2015.

  Cyber-attacks are increasing in number and sophistication. Today’s threats differ from
  those encountered a month ago.

                                                                Source: Symantec’s 2016 Internet Security Threat Report

                                                                                                              10
Setting the Stage | Not a Case of if, But When

  Organized crime rings are responsible for the majority
  of attacks.

  Lone hackers, who are in it for either individual
  financial gain or the thrill of the chase, still initiate a
  small percentage of cyber threats.

  Hackivists are individuals who use the act of
  hacking, or breaking into a computer system,
  for a politically or socially motivated purpose.

  Some breaches are linked to insider activity for
  financial gain.

                                                                11
Setting the Stage | The Bottom Line

                NOT A CASE OF IF, BUT WHEN…

                 & HOW MUCH WILL IT “COST”

                                              12
Setting the Stage |    Payment Fraud is Still a Concern… but Cyber Risk is Growing

 “…the year of online extortion. Cyber extortionists will
 devise new ways to target its victim’s psyche to make
 each attack personal..”
 -Trend Micro

 “Organizations need to realize that (immediate) financial
 gain is no longer the only or even the biggest driver….”
 -Amit Yoran, RSA

 “Credit Card number sells for $2 on the black market
 while a health record goes for $20 or more…”
 -Peter B. Nichol, PMP, CSSMBB

                                                                           LINE OF BUSINESS   13
Tales From The
     Field
Select stories from Kelser, your trusted
 cybersecurity and IT service provider.
… but first

A quick HIPAA recap: Your obligations.
HIPAA: § 164.306 Security Standards

1. Ensure the confidentiality, integrity,
and availability of all electronic
protected health information the covered
entity or business associate creates,
receives, maintains, or transmits.
HIPAA: § 164.306 Security Standards

2. Protect against any reasonably
anticipated threats or hazards to the
security or integrity of such information.
HIPAA: § 164.306 Security Standards

3. Protect against any reasonably
anticipated uses or disclosures of such
information that are not permitted or
required under subpart E of this part.
HIPAA: § 164.306 Security Standards

4. Ensure compliance with this subpart
by its workforce.
You are ultimately responsible for
protecting the confidentiality, integrity,
and availability of patient information.
Things We Commonly See
• After 12 years, support for
  Windows XP ended April 8,
  2014. There are no more
  security updates or support for
  Windows XP.

• Almost 3 years have passed
  since security updates have
  been released for Windows XP.

• HIPAA: “Protect against any
  reasonably anticipated threats
  or hazards to the security or
  integrity of such information.”

• 3 years without a refresh is
  beyond “reasonable” at this
  point.
• Grossly unprotected systems in
  exam rooms.

• Unauthorized access to:
   • View records
   • Change records
   • Install CnC to harvest/breach
     data remotely

• There are relatively simple
  solutions that fix this problem -
  software/tokens, physical laptops,
  automated screen locking.
• All practices we’ve worked with
  have some files stored on
  networked PCs or on premise
  servers. Even those that have a
  cloud-hosted EMR!

• Do you know where patient
  data is? You are still
  responsible for it!

• How do you protect this data?
  Are you taking “reasonable”
  steps or doing nothing?

• Is your workforce trained in
  handling sensitive information?
• Under HIPAA, MAPFRE
  (Insurance Company of
  Puerto Rico) will pay
  $2,200,000 resulting from a
  stolen USB storage device
  from its IT department.

• MAPFRE failed to perform a
  risk analysis or implement a
  risk management plan.

• MAPFRE did not utilize
  encryption, train their
  employees, or implement
  reasonable security measures
  on its laptops and storage
  devices. (Hint: encrypt
  everything!)
• According to Ponemon, the
  average cost of a data breach
  for healthcare organizations is
  $355 per record.

• Let’s say you have 1,500
  patient records. If your
  practice was compromised, it
  could cost you over $500,000
  in this scenario.

Source: 2016 Cost of Data Breach Study:
Global Analysis, Ponemon Institute LLC
• Do you provide cybersecurity
  awareness training for your
  staff?

• Is your staff vulnerable to
  phishing attacks? How do
  you know – have you tested
  them?

• Humans are a weak link!

• HIPAA: “Ensure compliance
  with this subpart by its
  workforce”
Ransomware – I’m sure you’ve heard all
about it.

•   Best way to extort $$$ from you
•   Very difficult to trace (due to BitCoin)
•   They love repeat business!
•   There’s even a way to infect your friends
    instead of paying!

• Depending on circumstances, a
  ransomware infection may constitute a
  data breach!

• Let’s talk $$$: say you had a productivity
  impact of 6 hours (VERY low estimate),
  with an office staff of 20 (mixed
  burdened cost). That could cost $7,000-
  $8,000 in direct lost productivity. Then
  factor in the cost of recreating records
  that were lost and the impact on patient
  workflow. Without adequate data
  protection, one ransomware incident
  could cost $8,000 to $20,000 alone!
Beyond the immediate financial
 costs, consider the impact to your
practice’s reputation if your patients’
     records are compromised.
Now What?
DO something about it with someone
you trust!

• Use experienced consultants
• Implement preventative care
• Plan for WHEN not IF
Thank You!
Types of Fraud | The Dark Web

     “Antivirus works by stopping the most advanced cyber attacks by using the malicious
   signatures to identify and block bad code form being loaded”

     The problem, today, is similar to a human immune system; if they have not seen this
   strain of a virus before – it does not know how to block it.

Adapted from a report in the WSJ by D. Yadron on Symantec Corp.

                                                                                           32
Types of Fraud | Setting the Stage

  The number of attacks is now so large and their
  sophistication so great, that many organizations
  are having trouble determining which new
  threats and vulnerabilities pose the greatest risk.
    ►   Attackers may be able to access
        information, monitor your actions, modify
        programs, or perform other functions on
        your computer without being detected.
    ►   Fraud is a “career”
    ►   Estimated that 35 million machines are
        infected
    ►   Targeted attacks against small and mid-
        sized business are increasing

                                                        33
Types of Fraud | What is Business Account Take Over Fraud?
 Stolen valid online banking credentials
   ► Username, password

   ► Answers to security questions

 Theft of valid online banking credentials occurs by social engineering or when
 business gets infected with malware.

 Malware downloaded via email or through a hot linked website
  ► Man in the Browser

  ► Invokes key logging which records key strokes to                    capture online
     banking credentials

 Business accounts are accessed and ACH and/or Wires                              are
 generated

 “Mules” hired to open accounts and forward the funds to               international
 destinations

                                                                                         34
Types of Fraud | Not Just Hack Attacks

 Stolen valid email capabilities and credentials
   ► Email system breached, or email slightly altered then

   ► Direct request to send funds by C-Suite (BEC)

 Fraudsters pose as vendors and request payments be made to a new bank account.

It’s not just dollars – Fraudsters
Are looking for Data!

                                                                                  35
Types of Fraud | FBI Internet Crime Complaint (www.ic3.gov)

                                                              36
Types of Fraud | E-Mail Account Compromise

  E-mail Account Compromise (EAC) is a sophisticated scam that targets the general
  public and professionals associated with, but not limited to, financial and lending
  institutions, real estate companies, and law firms.

  The EAC scam is very similar to the Business E-mail Compromise (BEC) scam,
  except that it targets individuals rather than businesses.

  In 2015, IC3 reported 8,119 cases of EAC were filed with the Internet Crime
  Complaint Center (IC3), with reported losses of $274 Million!

                                                                                        37
Types of Fraud | Malvertising

“Provider of security products,
WatchGuard, predicts that
malvertising attempts will triple
in 2016;”

Familiar Malvertising Victims:
  ► New York Times

  ► The BBC

  ► Spotify

  ► The London Stock Exchange

   BBC, The New York Times, and MSN were hit by a coordinated malware campaign
   Delivered through the advertising networks used by the sites
   The malvertising attack aimed to install ransomware on victims’ computers.

                                                                                 38
Types of Fraud | (BEC) Business E-Mail Compromise

 ►   Do not open e-mail messages or attachments from unknown individuals

 ►   Be cautious of clicking links within e-mails from unknown individuals

 ►   Be aware of small changes in e-mail addresses that mimic legitimate e-mail
     addresses

 ►   Question any changes to wire transfer instructions by contacting the associated
     parties through a known avenue.

 ►   Have a dual step process in place for wire transfers. This can include verbal
     communication using a telephone number known by both parties.

                                                                                       39
Types of Fraud | And the ^ Fraud Approach Keeps Evolving

                                                           40
Types of Fraud | Ransomware…Crypto Locker

                                            41
Types of Fraud | Protect Your Computer

In 2015, IC3 received
2,453 complaints with
reported losses of $1.6
Million!

                                         LINE OF BUSINESS   42
Types of Fraud | Scam “Can You Hear Me Now?”

                                 Fraudster obtains personal
                               information via a data breach
                                    EX. Credit Card info is
                                        compromised

         Victim attempts to                                            Fraudster calls       “Can you hear
        dispute charge and                                        unsuspecting consumer
         fraudster provides
      recording of consumers
                                                                  and asks a question that
                                                                  prompts the consumer to
                                                                                             me now?”
              consent.                                                  answer “yes”

                               The consumers “yes” response
                                  is recorded and used as
                                  “affirmative consent” to
                                authorize a charge; i.e. Credit
                                Card purchase, bill payment,
                                            etc.x`

                                                                                                         43
Each Control Provides Security in Layers
 Recommend dedicated accounts for receivable, operating, and disbursement accounts :

       Cash Inflow                              Information Reporting                         Cash Outflow
       Receivable                                      Operating                              Disbursement
        Account                                         Account                                  Account
                                JIT Funds                                  JIT Funds

► Post no   debits                      ► (2x) Daily Cash   Position               ►   Check Positive Pay
► No ACH    or wire                     ► Just in Time   (JIT) Transfers           ►   ACH Positive Pay
  origination capability                ► Mandatory Alerts                         ►   Controlled Disbursement
► Mandatory Alerts                                                                 ►   Daily Review/ reconciliations
                                                                                   ►   Mandatory Alerts
 ►Separate Account for check      and EFT activities
                                                                                   ►    Dual Control/Tiered security
 ►Dedicated PC       (segregate from network)                                          (separate and distinct access)
 ►Up-to-Date Anti-Virus, Anti-Malware, and        Network Controls                 ►   Limits set to business needs
 ►Ongoing and        Regular Employee, Vendor and Partner Education

                                                                                                                        44
How to Mitigate Risk | I Know Your Password

                        “Passwords are awful and need to be shot”

         J. Grant, head of the National for Trusted Identities in Cyberspace Federal
                                   Government Task Force

                                                                                       45
How to Mitigate Risk |   Easy to Guess Passwords

                 123456                     football

                password                   baseball

                 qwerty                      dragon

                         CYBER FEUD

                                                       46
How to Mitigate Risk |         Easy to Guess Passwords Open Door to Hackers

  Hacking into a voicemail account can be as easy as 1-2-3-4.
  Certain password configurations are very popular showing many people aren't using
  random numbers (over 200,000 iPhone users surveyed)

                                        PIN Used                                                     Rank
                                        Same digit (0000,1111,etc.)                                      1
                                        Years (from 1900-2011)                                           2
                                        ABAB format (1010, 2121, 3131, etc.)                             3
                                        1234                                                             4
                                        2580 or 0852 (center of keypad)                                  5
                                        5683 (spells LOVE)                                               6

                                                                      Source: Big Brother Camera Security, Daniel Amitay

                                                                                                               47
How to Mitigate Risk | Strong Password

                      GoAway$UMeanHacke3s!

     Password Rules

      ►   Do not write them down or store in a file that can be hacked
      ►   Use different passwords for different applications
      ►   Don’t be obvious on Passwords - hackers can social engineer a guess
      ►   The same holds true for Challenge questions

                                                                                48
NETWORK SECURITY & PRIVACY
                                                                                 (“CYBER”) OVERVIEW
                                                               2017
                                                               February

                                                                   Larry Racioppo, SVP | Management & Professional Services (MPS)
                                                                                                                    www.usi.com
CONFIDENTIAL AND PROPRIETARY: This presentation and the information contained herein is confidential and proprietary information of USI Insurance Services, LLC ("USI"). Recipient agrees not to copy, reproduce or distribute this document,
in whole or in part,
      © 2014         without the
               USI Insurance     prior written
                              Services.         consent
                                        All rights       of USI. Estimates are illustrative given data limitation, may not be cumulative and are subject to change based on carrier underwriting. © 2014 USI Insurance Services. All rights reserved.
                                                   reserved.
Discussion Points
                   Cyber Statistics
                   What a cyber policy covers?
                   Regulatory impact
                   Emerging exposures
                   Negotiating a cyber placement
                   What does a policy cost?

                                                                   | 50
© 2014 USI Insurance Services. All rights reserved.
Why is Cyber Risk awareness critical?
             Healthcare industry has experienced largest # of cyber attacks
                           Median loss is $150,000

             Small Breaches (under 100 records - 49%) and Medium Breaches (100-1M
              records - 50%) occurred far more frequently than large breaches

             Impact companies of ALL sizes
                                        40% large companies (over $1B in revenue)
                                        37% medium companies ($10M - $1B)
                                        23% small companies (under $10M)

    Stats: Hiscox/Advisen Cyber InfoGraphic November 2016

                                                                                     | 51
© 2014 USI Insurance Services. All rights reserved.
Why is Cyber Risk awareness critical?
             $158 — average cost per record in a data breach. Average total breach
              incident cost increased to approx. $4m in 2015. Average cost per record in a
              healthcare data breach is $355

             96% of breaches could have been avoided if reasonable data security controls
              had been in place at the time of incident

             Cyber and Privacy attacks are the #1 risk noted by CEO’s across business
              classes and company sizes

    Stats: Ponemon 2016 study (sponsored by IBM), and FIS Risk Practices Survey 2016

                                                                                         | 52
© 2014 USI Insurance Services. All rights reserved.
Do you believe in miracles?

                                                                             | 53
© 2014 USI Insurance Services. All rights reserved.
What Can a Cyber Policy Cover?
                                                                      Security/Privacy Liability

             First Party                                       First Party                  Third Party                Third Party
  Breach Notice Costs                                    Other Business Costs              Civil Lawsuits          Regulatory Actions
 Forensic Investigation                                Business interruption        Consumer class action     State AG investigations
 Crisis management/PR                                  Data repair                  Corporate or financial    FTC investigations
                                                         /replacement                  institution suits
 Notification costs                                                                                             Health & Human
                                                        Cyber-extortion              Credit card brands         Services
 Credit monitoring
                                                        Social Engineering           PCI fines, penalties,     Foreign Privacy Entities
                                                                                       and assessments

                                                                                                                                         54

 © 2014 USI Insurance Services. All rights reserved.
HIPAA

                                                       | 55
© 2014 USI Insurance Services. All rights reserved.
HIPAA
                       •12-physician pediatric and adult dermatology practice
                                     •Paid $150,000 for alleged HIPAA violations
                                     •Lost, unencrypted flash drive containing protected health information (PHI)

                       •5 physician cardiology group
                                     •$100,000 settlement
                                     •Posting clinical and surgical appointments for patients on a publicly
                                     accessible internet-based calendar
                                     •Failed to implement even the most basic HIPAA requirements

                       •An orthopedic clinic
                                     •$750,000 settlement
                                     •Failed to execute a business associate agreement prior to turning over
                                     17,300 patients’ PHI to a potential business partner

                                                                                                                    | 56
© 2014 USI Insurance Services. All rights reserved.
HIPAA
                    •Jason Pierre-Paul sues ESPN/Adam Schefter for twitter post
                        •Details of recent settlement unknown

                                                                                   | 57
© 2014 USI Insurance Services. All rights reserved.
CFO REACTION TO HIPAA PENALTY

                                                                               | 58
© 2014 USI Insurance Services. All rights reserved.
E-mail received from “PayPal”:                        Cyber Stat
You’ve sent a payment of $90 to Youseff
Mansouer

Forwarded to PayPal and their
response:

Did you know that
approximately 90% of all email
sent worldwide falls into the
spoof, phishing, spam, and
general junk category?                                         59

© 2014 USI Insurance Services. All rights reserved.
Emerging Exposures – Social Engineering
                    Social Engineering
                    Hackers use trickery, based on internal or vendor
                    communication, to induce employees to process fraudulent
                    wire transfers
                     Average “Social Engineering” related loss is $130,000
                                  $100,000 to $500,000 is the norm for mid-size businesses
                     Notables:
                                  Xoom Corp. - $30M (January 2015)
                                  Ubiquiti Networks - $46.7M (August 2015)
                     IRS W-2 schemes
                                                                                              60

© 2014 USI Insurance Services. All rights reserved.
Emerging Exposures- Ransomware
                Cyber Extortion (aka Ransomware)
                Cyber attack that involves a demand for $$ to avoid or stop a
                network attack/data breach
                On average, in 2016 there are approx. 4,000 ransomware
                attacks per day…up from 1,000 in 2015
                 77% of attacks b/w $500 - $10,000

                                                                                   61

© 2014 USI Insurance Services. All rights reserved.
Cyber Insurance as a Last Line of Defense
                                 Fills gaps in “traditional” property/casualty insurance
                                 Acts as a financial backstop to protect your budget
                                 Be out in front with continuity planning
                                 Assist in establishing relationships with key vendors
                                 Demonstrates an organizational commitment to network security/privacy

                                Access to wide range of resources at time of loss:
                                 Forensics firm – who, what, where, when
                                 Attorney for various state requirement compliance
                                             Including contractual indemnification obligations
                                 Public Relations expense – brand protection
                                 Credit monitoring, notification assistance
                                 ID restoration services
                                 Licensed investigator/fraud specialist

                                                                                                          62

© 2014 USI Insurance Services. All rights reserved.
Pre-Breach Resources?
                                 FREE with policy purchase
                                 Data Security Training
                                 Anti-Phishing and Social Engineering courses
                                 Incident Response Plans
                                             Mobile Device
                                             E-Mail
                                             Removable Device
                                 Cyber Fitness checklist
                                 Assign and manage training for your employees

                                                                                     63

© 2014 USI Insurance Services. All rights reserved.
Post Breach – who ya gonna call?
             Data Breach Coach
             Forensics support
             IT support
             Public Relations
             Insurance Company

                                                                                     64

© 2014 USI Insurance Services. All rights reserved.
Negotiating a cyber placement
              Breach Response Costs coverage
                                         - Offered at full policy limit or sub-limited?
                                         - Inclusive of overall limit or “Outside” the limit?
              Other things to consider:
              - Regulatory coverage (seek full limit and defense/penalties)
              - Seek full “unknown” prior acts coverage
              - Avoid “Unencrypted portable device” exclusions
              - Data restoration/business interruption cover (waiting period)?
              - Cyber extortion/ransomware coverage?
              - Social Engineering sub-limit offered?

                                                                                                65

© 2014 USI Insurance Services. All rights reserved.
How much does it cost?
                Limit                                 Revenue    Retention   Premium
                  1M                                    56M         25k         13k
                  1M                                    89M         50k         13k
                  1M                                    15M         10k         8k
                  2M                                   120M         50k         21k
                  2M                                    49M         25k         27k
                  2M                                   156M        100k        18k
                  3M                                    78M         25k         20k
                  3M                                    44M         10k         33k
                  5M                                    1.6B       250k        100k
                 10M                                   482M         2M         86k

                                                                                       66

© 2014 USI Insurance Services. All rights reserved.
How to Mitigate Risk | Where Is Fraud Occurring

                                                                          • 73% of organizations experienced
                                                                          attempted or actual payments fraud
Prevalence of Attempted Fraud :                                           in 2015.
                                                                          • 42% of survey respondents report
   Payment Channel      All Respondents                                   that incidents of fraud increased in
                                                                          2015.
Checks                             71%
                                                                          • Checks continue to be the
Credit/debit cards                 39%                                    payment method most often targeted
ACH Debits                         25%                                    to commit payment fraud with 71%
                                                                          of effected organizations reporting
Wire Transfers                     41%                                    their checking accounts had been
                                                                          targeted.
                                                                          • Among organizations that did
                                                                          suffer a financial loss resulting from
                                                                          payments fraud in 2015, the typical
                                                                          loss was up to $25,000.
                          Source: 2016 AFP Payments Fraud and Control Survey,

                                                                                                                   67
How to Mitigate Risk | What to Do If You’ve Been Hacked
  Don’t unplug – malware resides in computer’s memory and not the hard drive.
  Turning off a computer erases the memory, and with it many traces of the hack.

  Call in the Pros

  Keep a chain of custody – record every time someone touches a compromised
  computer or server and everything that’s done to it

  Stop the bleeding – Figure out how the hacker broke in, and fix that hole.

  Find out what they stole

  Figure out who to tell

  Be apologetic – in your customers minds, it’s your fault!

                                                                                   68
How to Mitigate Risk | What Should You Do Next? (Today!)
 Establish “Dual Control” authorizations and Review your limits for ACH and Wire to
 determine if they suit your business needs

 Consider a “stand alone” computer that is used exclusively for online banking

 Inventory all systems and programs that use the Web. What would you do if they were
 hacked today – who would you call? Are all of your “patches” and updates current?

 If you were hacked, how would you meet your business goals? How would your
 customers react?

 Review your internal controls (review Fraud Awareness Checklist as a start)

 Then, schedule a meeting with your trusted advisors to review your total risk exposure
 and learn how to mitigate those risks.

                                                                                          69
1.   Establish a Security Culture
2.   Protect Mobile Devices
3.   Maintain Good Computer Habits
4.   Use a Firewall
5.   Install and Maintain Anti-Virus Software
6.   Plan for the Unexpected
7.   Control Access to Protected Health Information
8.   Use Strong Passwords and Change Them Regularly
9.   Limit Network Access
10. Control Physical Access
                                                      Source: healthit.gov

                                                                             70
How to Mitigate Risk | Electronic Health Records
                                           Good patient care also means safe
                                           record-keeping practices.

                                           Never forget that the electronic health
                                           record (EHR) represents a unique and
                                           valuable human being.
     Electronic Health
         Records                           Cybersecurity experts recommend not
                                           transmitting electronic health
                                           information across public networks
                                           without encryption.
                      Encrypt
                                           Most common way that (EHR)
                                           information is compromised is through
                                           the loss of devices.

                                                                       Source: healthit.gov

                                                                                          71
How to Mitigate Risk | The Weakest Link in Any Computer System is the User
                                          The consequences of a successful cyber-
                                          attack could be very serious and is far
                                          greater than merely the financial
                                          implications.

                                          In addition to direct costs there are:
                                            ► The cost of computer downtime

                                            ► Plummeting productivity

                                            ► Lost sales opportunities

                                            ► Regulatory fines

                                            ► Worried Customers

                                            ► Concerned vendors

                                            ► Loss of patient trust

                                            ► Violations of the Health Insurance
                                               Portability and Accountability Act
                                               (HIPAA)
                                            ► Loss of life or of the practice itself
                                                                             Source: healthit.gov

                                                                                                72
How to Mitigate Risk | Fraud Checklist

  Engage your Partners:
   ► Accountant

   ► Insurance

        • Cyber Liability
   ► Legal

        • Involve your Practice
          Partners
   ► IT Consultant

        • Forensic IT on call
   ► Banker

   ► Public Relations

                                         73
Cyber Security | Is Your Practice at Risk?

                                             74
How to Mitigate Risk | Value of Your Reputation … Priceless!

                                            The true costs to business from threats are
                                            far greater than merely the financial
                                            implications.

                                            In addition to direct costs there are:
                                              ► The cost of computer downtime

                                              ► Plummeting productivity

                                              ► Lost sales opportunities

                                              ► Regulatory fines

                                              ► Worried Customers

                                              ► Concerned vendors

                                              ► Patient trust

                                                                                     75
Cyber Security | Business Cards

Laurance Selnick, CTP, Senior Vice President,   Lawrence A. Racioppo, Senior Vice President
Director, Treasury & Payment Solutions Sales    Management & Professional Services
CityPlace II                                    USI Insurance Services LLC
185 Asylum Street HFD 640                       Phone: 203.291.2015
Hartford, CT 06103                              Toll Free: 855.874.0123
Phone: 860.691.1679                             larry.racioppo@usi.biz
Lselnick@Websterbank.com

Matt Kozloski                                   Jordan Arovas, SVP
VP, Professional Services                       Specialty Business Banking
Kelser Corporation                              157 Church St., 20th Floor
111 Roberts St. Ste. D                          New Haven Ct, 06510
East Hartford, CT 06108                         Phone: 203.782.4656
Phone: 860.610.2200                             Jarovas@websterbank.com
MKozloski@Kelsercorp.com>

                                                                                              76
Moderator | Laurance Selnick, CTP

     Director, Treasury & Payment Solutions Sales

      Larry has almost 40 years of banking experience including cash management systems, bank operations
       and product management. He joined Webster’s management team in 1995 to design, implement and
       deliver cash management services to commercial clients. He speaks on Cyber Security issues to clients
       and recently moderated a panel on Cyber Liability at Connecticut Technology Councils Cyber
       Awareness series. Larry currently leads a team of Consultative Sales Treasury Management
       professionals to review and provide recommendations on how to best utilize cash management
       products to improve a client’s cash flow needs.

      Larry serves on the New England ACH Payments Board of Directors and is a member of the Executive
       committee focusing on payments information training and regulatory awareness. He is a member of the
       New England Association for Financial Professionals and National Association for Financial
       Professionals (AFP) and holds the Certified Treasury Professional (CTP) designation from the AFP.

      Larry is active in the community where he volunteers as a mentor in a local elementary school and is
       Chair emeritus of the Webster Bank Mentoring program. Larry has served on the Board of Directors of
       the Connecticut/Rhode island region of the American Red Cross and United Way of Connecticut 211
       Call center and recently joined the Business Advisory Council of the School of Business at Southern
       Connecticut State University.

© 2014 Webster Bank, N.A. Member FDIC
All rights reserved.

                                                                                                               771
Lawrence A. Racioppo, SVP – Management and Professional Services

          Larry began his insurance career in the claims and underwriting areas of AIG followed by Chubb. He
           transitioned to the brokerage side of the business when he joined Marsh and McLennan in 2001,
           serving as a Senior Vice President in their Financial and Professional (FINPRO) practice for 9 years.
           Prior to joining USI Insurance Services in 2014, Larry was Vice President at JLT Towers Re, where he
           led their Executive Liability Practice.

          Over the past 20 years he has developed comprehensive and creative solutions for both commercial and
           financial institutions. He deals with all aspects of the transaction for a broad range of management and
           professional liability products, including: directors and officers liability, employment practices liability
           and network security/privacy related coverages.

          In his current role as Senior Vice President, Larry is responsible for providing Management and
           Professional Services for USI’s Connecticut, Northeast and Mid-Atlantic regions.

                                                                                                                          78

© 2014 USI Insurance Services. All rights reserved.
Introduction
This Is Me:
              Matt Kozloski, VCDX and CISSP
              VP, Professional Services at Kelser Corporation

Kelser has been in business for 35 years. We offer technical and non-technical consulting services
to improve your cybersecurity posture and on-going defense, detection and response strategy.

Lots of tech companies talk about being partners with their clients. My vision for Kelser? That our
clients will be downright excited when we arrive on the scene, not just because they enjoy
working with us, but because they understand the impact we can have on their business.

As Vice President of Professional Services, I encourage my team to think of themselves as
consulting engineers, not just engineers. “There’s a part to consulting that’s art and can’t be
exactly taught or explained. It’s empathizing with a customer’s situation, being responsive and
responsible, and maintaining integrity along the way.”

With every engagement, I push us all to think of what tangible business outcome our work will
provide for our clients, and for their clients.
You can also read