Identity Theft - Protect Customer Information

Identity theft is the unauthorized acquisition of a person's personally identifiable information (PII). The unauthorized acquisition may occur if the person does not follow individual security best practices. It may also occur if an organization that stores the PII does not have sufficient or effective security controls.

According to the Health Insurance Portability and Accountability Act (HIPAA), there are 18 forms of information that can personally identify an individual. These include a person's name, address, birth date, age (if over 89), e-mail address, Social Security number, account number, license number, Internet Protocol (IP) address, etc.

Instead of working hard to get PII a thief may turn to a hacker for assistance. Data breaches are one of the main sources of identity fraud. In 2013, one in three people who received notifications of a data breach discovered their identities were used for fraudulent means.

Security Breach Protection

Businesses are subject to a wide range of threats including identity theft and security breaches. A security breach is defined as the compromise of security, confidentiality, or integrity of, or the loss of, computerized data that results in unauthorized acquisition of sensitive PII or access to sensitive PII that is for an unauthorized purpose. Altius IT recommends organizations take the following steps to reduce their risks to security breaches and identity theft.

CSO. Appoint a Chief Security Officer (CSO) that oversees physical security and information security (cyber security) for the organization.

Inventory. Know your sensitive data, where it is entered, transmitted, stored, and appropriate disposal procedures. Create charts and other documents that document the flow of sensitive information through the organization.

Risk management. Prepare a risk assessment that identifies your assets, threats to assets, vulnerabilities that exist as a result of the threats. Prepare a risk analysis that identifies the likelihood of the event and impact on the organization. Prepare a Risk Treatment Plan with preventive, detective, and corrective controls that treat risks.

Policies. Prepare and implement policies, plans, forms and related controls that provide top down security guidance and direction.

Safeguards. Implement administrative, physical, and technical safeguards and controls that reduce risks to acceptable levels. Controls include passwords, software patching, firewalls, anti-malware software, logging and monitoring systems, network segmentation, wireless network security, incident response plans, intrusion detection and prevention systems, security training, restricted physical access to facilities, etc.

Compliance. Many state and federal data breach laws exist. The CSO and/or a compliance officer should be aware of data breach requirements and regulations. Procedures should be established:

Security audit. Contact a Certified Information Systems Auditor to perform a security audit of your environment to ensure the safeguards and controls are sufficient and effective. Typical audits include:

Summary

Leading organizations use a formal approach to managing risks related to identity theft and security breaches. Security audits help ensure security controls are sufficient and effective at detecting and preventing security breaches. Formal and documented policies ensure a top down approach to managing network security risks.

Security Blog
verified If You Want a "Security Audit"
You Need a Certified Auditor.
Certified Information Systems Auditors

Unlike a security consultant, Altius IT is certified as a Certified Information Systems Auditor to perform a security audit of your environment and issue reports and recommendations to secure your systems. After your audit, Altius IT's Auditor Opinion Letter and Secure Seal let your clients and prospects know you meet security best practice/compliance requirements.

See our In the News page for video clips of our experts on national television as well as over 40 publications featuring Altius IT. In addition to our auditor certifications we hold many security, technical, and project management credentials. More information is available on our About Us page.

Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your information systems, applications, and network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets