{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"Cyber Security: How Exposed Are You?","description":"In the 12th episode of the Confident Wealth Podcast, Bill Bush and Pete Bush talk with David Patr\u00f3n, a partner and Practice Coordinator at Phelps Dunbar, for the law firm\u2019s New Orleans Litigation Group. During this talk, David discusses the importance of data security, preparations to prevent data breaches, and the ways in which cyber-attacks can take place. &amp;nbsp; Time Stamped Show Notes:  01:47 \u2013 David discusses cyber-attack vulnerabilities from malware, hacking, phishing attacks, internal sabotage, and careless employees.   03:42 \u2013 The technology officer of a company needs to stay aware of security issues.   05:39 \u2013 Train employees how to stay aware of securities problems and preventative measures they should be taking.   06:59 \u2013 Engage companies that offer hacking simulations to penetrate your system to detect weaknesses that need to be remedied.   08:13 \u2013 Invest in cyber security insurance, which is relatively inexpensive right now. 09:50 \u2013 Assemble experienced executive, forensic, and legal response teams, and formulate a plan of action which includes public relations efforts, in advance before an attack even happens.   13:01 \u2013 Once you detect an attack, you need to contain it, and deal with any litigation that may occur.   15:31 \u2013 State statutes regarding data breach vary by jurisdiction, and it is a sliding scale.   18:05 \u2013 The typical lawsuits that pertain to data breach include: lawsuits brought by regulatory agencies, class action suits brought against security fraud, and lawsuits brought on by individual affected customers.   19:41 \u2013 Data security should be a top priority for a company. The attackers are becoming more sophisticated.   22:33 \u2013 The role of the attorney is often pre-incident front-end consulting and risk-assessment, and incident response.  3 Key Points:  Cyber Security Checklist:  &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Install basic security equipment and anti-virus software for email servers and final user devices. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Firewall technology. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Web filter and spam filter software. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Data loss prevention software.  Utilize reliable companies that offer hacking simulations to penetrate your system to detect weaknesses that should be fixed.&amp;nbsp;   Cyber security insurance is an importance and affordable investment to make right now.  &amp;nbsp; &amp;nbsp; Tweetable Quotes: -&amp;nbsp;&amp;nbsp;&amp;nbsp; \u201cKnow your enemy.\u201d&amp;nbsp; \u2013 David Patron. &amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp;&amp;nbsp; \u201cYou have to invest in cyber security technology. If you don\u2019t, as a company, you are just being negligent. And you are setting yourself up for litigation if something does happen\u201d \u2013 David Patron.&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp;&amp;nbsp; \u201cYou want to have robust human resource programs to educate your employees about the importance of staying vigilant and being aware.\u201d&amp;nbsp; \u2013 David Patron.&amp;nbsp;&amp;nbsp; &amp;nbsp; Resources Mentioned:  Horizon Financial Group \u2013 website for Horizon Financial Group Confident Advisor Practice \u2013 podcast for Confident Advisor Practice Phelps Dunbar \u2013 Website for Phelps Dunbar\/David Patron\u2019s profile LinkedIn \u2013 David Patron\u2019s LinkedIn page  ","author_name":"The Confident Wealth Podcast","author_url":"http:\/\/confidentwealth.libsyn.com\/website","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/6496574\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/item\/6496574"}