Archives For digital money

ohioSpeaker Notes for Tomorrow’s Session in Cincinnati…

This morning I am headed to Ohio to meet with business leaders in the Cincinnati area – Another Digital Money session on Stopping Hackers!

If you provide IT services to businesses, I hope you’ll consider doing one of these with me at some point. Every business needs it, and most don’t understand the threats they are up against.

It’s a busy fall for us. Last week we wrapped up a session in San Francisco with large reseller executives, then headed down to work with a large sales team in Irvine, CA.  And tomorrow, Cincinnati, a session sponsored by InTrust-IT…

The Most Frequently Misunderstood Truth In Small Business

The big question always comes up, “Why would anyone want my data? After all, we’re just a local business. There’s nothing interesting here.”  I think Verne Harnish answered that question last week. If you’ve read his books, Rockefeller Habits, and Scaling Up, you know he’s a small business with very little in the way of infrastructure. Like me, he’s a speaker and a business coach, supported by a small team. Yet his blog post tells the story of a $400K ruse that caught him and his team completely by surprise.

Why small business? Because small businesses still have money, take out loans, and process credit cards. They have bank accounts and payrolls. Today’s hacking tools are largely automated. So sending out hundreds or thousands of scamming emails takes the hacker very little time. When one lands, the hacker will follow up. Small businesses are also largely unprotected by this sort of thing.

It might be a fraudulent invoice or request for ACH wire transfer. In Verne’s case he writes, “They sent an email to my assistant completely imitating my style, subject line, and signature asking her to wire funds to three different places.” This is getting more and more common. The more data we put online about ourselves, the easier it is for someone to impersonate us!

Tomorrow’s Session is About Digital Money and the Value of Data

Digital Money, my latest book, goes into detail on this. Data aggregation is in motion, pooling our data in one place where it can be analyzed.

There are several major data aggregators out there doing this. But the idea is to collect enough data to profile YOU. This is usually for the purpose of some analysis or marketing effort. We’re seeing it used right now in the election. That’s right. The candidates are leveraging this data to figure out who is likely to be on the edge, and needs a push. The data tells them both who to target  and how to influence them.

That data in the hands of the hacker allows the hacker to act just like Verne, or whoever they need to be, to issue orders to the team. Verne’s on stage in Russia, meanwhile his team is getting instructions to transfer funds. Will they? Of course. They’ve received these requests in the past, and they were real. There’s no reason to question them now, and the hacker knows that. These attacks are well scripted and highly successful. And the likelihood of prosecution is low.

Can it be stopped? Not completely. But there are ways to reduce the risk…and that moves us to a managed security program that involves people and technology, well equipped to deal with these common attacks. A program that detects these threats early on, before data has been compromised, and stops them before damage is done. Tomorrow, my goal is to give our audience the business-level understanding they need to make wise decisions going forward. And then to point them to the tools and process they’ll need to combat these attacks in the coming year.

© 2016, David Stelzl

 

Advertisements
img_4188

Stage Set Up

300 Security Leaders Meeting in Miami

Looking for More Tools to Combat Cybercrime!

I’m just heading back from meeting with over 300 CISOs and CIOs, all part of the Florida International Banker’s Association –  Celaes Event, at the Trump Hotel, Doral.  

Great event, very well run, and an opportunity to connect with security leaders from all over Central and South America.  I was also able to reconnect with old friends from Kaspersky and Dimension Data.

Here are a few pictures…You’ll notice Former Mayor Giuliani on stage as well!  The living room shot was part of my amazing suite…

And I’m leaving just in time to avoid Matthew, the latest hurricane headed this way.

 

san-antonio-riverwalkCPA Firms Have Some Serious Data

This morning I kicked off Allinial Global’s technology conference with a keynote on Digital Money and the growing value of data. Allinial is an association of over 8000 accounting professionals around the world. This week’s IT conference, held in San Antonio, focuses on the IT organizations that support these accounting firms.

I was encouraged to see that most of their agenda was focused on security!

While there are lot’s of IT topics worth discussing, security is by far the most pressing need. During our lunch break I heard from several attendees who reported various attempts on their companies, with hackers trying to get insiders to wire money to fraudulent accounts (CATO). This reinforces the message that corporate account takeover attacks are a real and A growing threat among small businesses.

We also discussed the need for small businesses to contract with outside security services providers to monitor traffic.  As I explain in my latest book, Digital Money, small businesses cannot afford to hire qualified security experts unless they themselves are also providing security services to their small business clients. Security people are expensive, and staying current means working on security every day.

Most IT professionals understand the need for more security, but getting management to act on assessments, and invest in proper detection/response strategies can be a challenge. Hopefully our session today has given this group a compelling message to take back to management. A message that moves them one step closer to strong detection and a timed response plan.

Check out Digital Money to find out what’s really going on out there, and why businesses are losing the battle…

© 2016, David Stelzl

 

 

If People Aren’t Responding to Your Message Keep Reading…

Technology Providers Need to Refocus If They Want to Help the Businesses They Serve

Last night I spoke to my church congregation on the  topic of security. That’s right, at the church. Some were in business, others were students, homemakers, or retired. They listened, asked questions, and commented after the talk that this was truly helpful. My hope is that  they left with some very practical steps to take to reduce their personal risk and exposure online.

The truth is, everyone is interested in security when it’s tied to their personal stuff. No one is interested when it’s about technology, with the possible exception of the IT person trying to enhance their resume.

Are People Calling You to Hear Your Message?

If you’re newsletters, blog posts, and website are littered with technical jargon, chances are no one is responding. But put a business or personal message in front of your prospects and they’ll tune in. Security is magnetic.digital Money Cover

Last week I was in Montana, speaking to small business owners in the small town of Helena. Not only did people come, some drove from the remote parts of Montana to hear this message. And at the end of my session, Information Systems of Montana was kind enough to offer their guests an assessment, just for attending. 90% of them said yes!  For an entire hour they were engaged, not checking email, but taking notes.

This month I’ve been invited to address business owners in New Orleans, deliver a large conference keynote in Miami, and speak to a CPA association in San Antonio. Why? Because people want more – they want to know what’s going on and how it affects them.

What’s Your Message?

It’s time to evaluate your message. Security and customer experience are likely the two most important topics out there when it comes to technology. If you write software, you can help people on the customer side. But if you’re working on managed services and infrastructure, you need security. Not just any security – focus on the trends and how they relate to the people you work with.

Remember, your prospects are building businesses. They’ll be using technology to create efficiencies and value. As they move forward, their security needs will be changing, and they’ll need advice. The person with answers will be in demand.

© 2016, David Stelzl

IMG_6236Your Client’s Data Value Demands a Response

Last week I spoke at the Oklahoma Technology Symposium at The Cox Convention Center downtown, and then again to business leaders at the Gailaria Country Club north of the city. (Thanks to AnchorPoint Security and Check Point Software.)

The value of your client’s data is rapidly growing, and this was central to both of my presentations.

The Proof is in the Ransomware

People are paying the ransom. They can’t afford not to. Just this morning the WSJ reported another incident, this one related to the Leavine family NASCAR race team. They only paid $500, but $500 for what? The true cost of a breach like this is much greater. The FBI estimates the total cost per incident to be around $333,000! And the incidents of ransomware now four times what they were last year.

If you’re not talking to your clients about ransomware, now is the time. But more than talk is needed. They need answers.

Start by assessing their exposure to this type of attack. Can your client detect it coming in with their current security set up? My guess is that most can’t. That’s a managed services offering right there. Few companies will have the expertise to do this internally. They also need user awareness training. One place to start might be my latest book, Digital Money. It will be out by the end of this month!

The fact is, more data is being created, and just about every business is down when their computers are down. Data defines just about everything, including all of their clients, R&D, projects, finances, etc. Without their data, they’re out of business. What’s that worth?

Digital Money

July 29, 2016 — Leave a comment

2016-07-26_16-21-40Digital Money

The Book Cover…And More

Where making headway…a few things you’ll want to know.

First, the target audience – business leadership. This is not a technical read. Instead, it answers the question, who’s at risk and how much risk do they have.

If you provide security solutions, especially assessments and managed security solutions, you’ll want every one of your customers to read this. Without beating around the bush, I clearly tell business leaders, they need your help! Not only can they NOT afford to maintain the right level of security people, they can’t afford the ongoing detection technology. Except with very large F500 accounts, they’ll want to outsource to you.

But I also provide insight into the kinds of things service providers must provide to small and mid-market companies.  Study what I say in this book and begin equipping your company to meet the core needs outlined in this book.

Due out in August!

© 2016, David Stelzl