You are on page 1of 20

ZOMBIE SURVIVAL GUIDE

:

SONY DATA
 BREACH
!
!

HOW NOT TO BE HACKED
SERIES & GUIDE

!
s
p
i
t
1
1
f
o
!
-3
E
L
P
M
A
10 ImmediateE
recovery
tasks
S
E
R
F
!
Designed explicitly for Sony employees, ex-employees,
business partners, actors, and their customers

!
!

!
!

!
!

!

!

James DeLuccia IV
Release: 2014-v1 sample

!

SONY BREACH SURVIVAL GUIDE

Copyright 2014, All rights reserved ISBN: 978-0-9863797-0-3
!1

Zombie survival guide
For a bit of comedic relief this guide will be in the form of a zombie
clean-up & respond kit

!
The Criminals that breached Sony hurt everyday people and
therefore you must act now to protect yourself.

!
The Sony Breach has created an apocalyptic scenario for Sony, it’s partners, and
everyone who was linked to the business. Professionally I serve large businesses on
designing and operating world class security & privacy minded global operations,
and from my external view, Sony has a tough road ahead. It is key to recognize this
isn’t just a Sony problem - this is an US problem too. We need to be armed and
respond to the oncoming winter of exposed digital, financial, and medical life.

!
SONY BREACH SURVIVAL GUIDE

!2

The infection was pervasive and that means the vendors, suppliers, customers,
contractors, affiliates, and anyone in-between can now be harmed - today, next year
or a decade from now. The reason for this is simple - the relationships, financial
details, security practices, trade secrets, behaviors, and details of each team
member is in the public space. Therefore the opportunity to harm you and those
businesses remains possible.

!
This survival guide is for the people that have been harmed and are often under
under-supported in responding to such events. The tasks in the following pages are
free to you and only require execution by you. There are service providers (zombie
monitoring, zombie traps, live wire zombie snares, etc) to provide elevated
effectiveness, and I will highlight where appropriate.

!
The book has pre-built tables that provide specific guidance to help you complete
each task. These are great in the printed book, and I recommend photocopying
these tables to keep in a folder for reuse. If you are working on the electronic
version, please examine the tables and leverage as best able.

!
!
!
!
!
!
!
!
!
SONY BREACH SURVIVAL GUIDE

!3

Table of Contents

!
Reference table of what tips apply to each individual ………..………… Pg. 5
Task 1, Personal Reports …………………………………………….……Pg. 7
Task, 2, Business Reports …………………………………………………Pg. 9
Task 3, Wire transfers ……………………………………………………Pg. 13
Task 4, Freeze Credit ……………………………………………….……Pg. 17
Task 5, Medical & Insurance …………………………………………….Pg. 19
Task 6, Financial Accounts ………………………………………………Pg. 23
Task 7, Preventive Services ………………………………………………Pg. 25
Task 8, Bank Accounts ……………………………………………..……Pg. 27
Task 9, Online Accounts …………………………………………………Pg. 29
Task 10, Sensitive files ……………………………………………………Pg. 33
Task 11, Bonus ……………………………………………………………Pg. 35
Why this book now ………………………………………………….……Pg. 38
About the author …………………………………………………………Pg. 38


This is a free sample of the larger
book available NOW on Amazon
Kindle (print edition soon)!

SONY BREACH SURVIVAL GUIDE

!4

Find the tips and actions below that apply to you!

!

Task #, topic

Employ
ees

Exemploye
es

Conrac
tors

Deloitte
Actors,
employees Actresses,
Agents

Suppliers Customers
/ Vendors

1 - Personal report
2 - Business Report
3 - Wire transfers
4 - Freeze Credit
5 - Medical &
Insurance
6 - Financial
Accounts
7 - Preventive
Services
8 - Bank Accounts
9 - Online
Accounts
10 - Sensitive files
11 - BONUS

!
Survival Guide: Top 10 actions for the next 2 weeks!
The enclosed activities here are not optional, but mandatory actions to be taken. I
have distilled down only the must do activities and grouped them by categories employees, ex-employees, actors, business partners, etc…

!
Please feel free to reach out with questions. I have setup a number of platforms
online for the purpose of sharing challenges and solving problems. I try to respond

SONY BREACH SURVIVAL GUIDE

!5

to every query - and while I refrain from selling anything try to provide examples
of resources that have delivered successful results.

!
Take actions now, and at least those that apply to you!

!
To prevent a life filled with zombies stealing your money, making false claims on
your insurance, or simply stealing your tax returns please take action. The tips
above apply to those who have been breached, and were specifically crafted to
create a prescription that helps manage the problem. To be clear, once this data is
released, some clean-up can be done in advance but the long term effects can be
more lasting.

!
All of these tasks will benefit you, regardless of class of harmed party. The table at
the beginning allows you to focus your time on the critical actions based on the type
of data released, but time permitting please consider dedicating more time to your
digital safety.

!
A more complete set of leading practices is in the works that focuses on life habits
and will be released on 2015 by me that will serve you, your family, and friends to
reduce identity theft damage and associated pain 300%.

!
Please join the mailing list for free guidance and book snippets at: www.hntbh.com

!
Also you can follow the Facebook page (if that is your preferred platform) at
www.facebook.com/hownottobehacked

!
!
SONY BREACH SURVIVAL GUIDE

!6

ZOMBIE TASK: PERSONAL REPORTS

!
!

!
!
!
!

!
!
Pull a !copy of your credit report from all credit bureaus for whole

family, and prevent financial identity theft

!

1
SONY BREACH SURVIVAL GUIDE

!7

Request a copy of your credit report from all 3 credit bureaus in the
United States.

!
This provides a snapshot of your personal current financial state for all open
accounts, requested credit applications, standing loans, and more. The first time
you receive these reports immediately confirm all the facts and accounts are
correct. It is very easy to make corrections, so make them.

!
Then RE-verify the facts remain true again, perhaps 6 months or 12 months later.
Now you can compare each report and take responsibility for the activity on your
reports - and that of your family, yes they are now at risk too.

!
Tools and Resources:

• Centralized credit report request site - https://www.annualcreditreport.com
• Links to the 3 major Credit Bureaus:
• equifax.com
• experian.com
• transunion.com
• Details on your rights at the U.S. Government’s FDIC site: https://
www.fdic.gov/consumers/consumer/ccc/reporting.html

!
Task 1 Workbook, year 20__ __
Me
Equifax

Spouse

Child

Example:
Done Feb 2nd

Experian
TransUnion

SONY BREACH SURVIVAL GUIDE

Done, Nov 1st

!8

ZOMBIE TASK: BUSINESS CREDIT REPORTS

!
!

!
!
!
!

Pull a Business Credit report for your personal businesses
to prevent hijacking of credit lines

!
!

!
!
!
!
!
!
!
!
!

2
SONY BREACH SURVIVAL GUIDE

!9

!
Request a Business Credit report for your personal businesses that have
received or transmitted funds to Sony accounts.

!
This should at least be done every 6 months for year 1, and then every 12 months
if no activity has appeared.

The details that you should seek out::
• In-depth credit history;
• Banking, insurance and leasing information;
• Bankruptcy filings
• Judgment filings against the business
• Tax lien filings levied against the business
• Credit inquiries made in the last nine months

!
Tools and Resources:

• The credit bureaus and financial directories can provide such detail:
• equifax.com
• experian.com
• transunion.com
• Dunn and Bradstreet - www.dnb.com
• A Wikipedia entry about the risks and attacks: http://en.wikipedia.org/wiki/
Credit_card_fraud#Carding

!
!
!
!
!
SONY BREACH SURVIVAL GUIDE

!10

Task 2 Workbook, year 20__ __
January August January Example:
Credit history

Verified, Jan 2015

Banking, insurance

Verified, Jan 2015

and leasing
Bankruptcy filings

Verified, Jan 2015

Judgment filings

Verified, Jan 2015

against the business
Tax lien filings

Resolved issue,
Jan 2015

Credit inquiries made

Verified, Jan 2015

in last 9 months
List of authorized

Verified, Jan 2015

Directors

!

SONY BREACH SURVIVAL GUIDE

!11

A little space for your thoughts and peace.

SONY BREACH SURVIVAL GUIDE

!12

ZOMBIE TASK: WIRE TRANSFERS

!
!
!
!

Sever and scrutinize financial accounts or suffer stolen funds
and grief

!

!
!
!
!
!

!
!
!
!
!

3
SONY BREACH SURVIVAL GUIDE

!13

Limit the ability for criminals to steal your money out of bank accounts
by modifying and reviewing authorized persons on financial accounts.

!
Maximize fraud prevention to make it very hard to transfer money out of your
accounts; near impossible for you not to be made aware of such a request, and
limit your direct liability by taking advantage of the free fraud prevention offers of
your banks.
Tasks:
• Verify your mailing address has not been changed
• Confirm only authorized parties are able to wire transfer,
• Verify who can add authorized persons
• Verify limited individuals can change these wire transfer permissions
• Raise the fraud prevention settings, by calling bank and reviewing them to
ensure all available are turned on, such as:
• This could mean getting a security token
• Require a phone call/text to wire money
• Disabling wire transfers out of your account (as if you ever use that feature)
• Set email alerts for any movement of any dollars
• Review bank account statements monthly - keeping an eye out for very
tiny transfers/charges (as these are typically tests before a large
withdrawal which you WILL definitely notice)
• Be sure your family and your business partners are aware of the new fraud
prevention methods

!
!

SONY BREACH SURVIVAL GUIDE

!14

Task 3 Workbook, year 20__ __
Business Business
Checking Savings

Business U.S.
401k /
Government
SEP
IRS

Example:

Verify mailing
address

Verified, Jan
2015

Authorized
parties able to
wire transfer

Verified, Jan
2015

Verify
permissions add & transfer
rights

Verified, Jan
2015

Raise the fraud
prevention
settings

Verified, Jan
2015

Security token

Verified, Jan
2015

Phone call/text

Verified, Jan
2015

required to
wire money
Disable wire
transfers out
Email alerts for
any movement

Verified, Jan
2015
Verified, Jan
2015

of any dollars
Review
statements

Verified, Jan
2015

monthly

!
!
!
!
SONY BREACH SURVIVAL GUIDE

!15

!
!
!

Ahhhhhh it is the end of the
sample, and there so much to
do!!!

Buy kindle book on
Amazon
Join Newsletter at www.hntbh.com
Join community on www.Facebook.com/hntbh
SONY BREACH SURVIVAL GUIDE

!16

This is the end of the free sample, and as a good friend of me said when explaining
this section:

!
“Well, this is just the tip of the ice burg. This will not fully save your ass.
You need to apply the other tasks raised in the full version of this book to
avoid having your finances and medical records get eaten by Zombies”

!
Why should you buy the full book and who is this
author?

!
You should buy the book and implement the full set of tasks, as the results speak for
themselves - you will be roughly 300% more secure and 20x less likely to suffer
any financial impact from events stemming from the Sony Breach. Save your
money, time, and frustration.

!
As for me, I have been in the security space for nearly 18 years, and lived through
the technical sub-basements of technology from programming, to setting up data
centers, and currently helping secure the largest corporations in the world. In
addition, the personal identity protection space is an area I have developed a patent
in, and like you - have been the victim of retailers and businesses own data
breaches.
I care very much about this topic and my hope is that by investing my time and
those that supported bringing together this material we can have a positive impact
on this situation.

!

SONY BREACH SURVIVAL GUIDE

!17

The book is available on Amazon for a print version, Kindle, or GumRoad for a
easy to view PDF version for your personal viewing. 


!
Please buy my book, apply the tasks, and join the mailing list at www.hntbh.com or
like the Facebook page at www.facebook.com/hntbh to receive real-time additional
tips as events occur in the world, and free book snippets of the upcoming books!

!
Why this e-book now specifically for the Sony breach

!
The release of this book focused on addressing the potential harm resulting from
the Sony breach is at a difficult and excellent juncture. At this time, I am in the
final months of writing my latest book - How not to be hacked, and producing a
series to help the average person change their behaviors to not be harmed by
attackers and criminals like those who executed the Sony breach. The book’s
practices will reduce the probability of being harmed by at least 300%, and cost
nothing to institute. I am also sharing through as many media channels as possible
the materials to improve the availability of such information. The book itself is at
the behest of my family and friends, and ultimately I hope it’ll help yours too.

!
At the same time, this is also a great time, as I have been working nights and
weekends for nearly 9 months now on this topic - I have a lot of research
completed that can be meaningfully shared to you rapidly. So in a way, 9 months of
research and writing for a book (not yet published) is being broken out into a form
for you.

!

SONY BREACH SURVIVAL GUIDE

!
!18

About the author:

!
James has been in technology and information security since 1996, and has worked
at both the hardcore technical areas (installing the wires and boxes), and has spent
the last decade building and leading global information security professionals.
James is a published inventor (encryption privacy related patent), a regular speaker,
a leader in the information security field, and a passionate father.

!
Greater details about the author:

!
James DeLuccia a published author, practitioner, auditor, is currently an executive
as a the leader within information security services and brings first hand research
and experience on third party vendor trust and global security operations. Mr.
DeLuccia leads the Americas certification and compliance services. His published
clients include Google, Amazon, Cisco, Equifax, and other leaders in their field. He
is certified as a CIA, CISA, CISM, CISSP, CPISA, CPISM, and degrees in Risk
Management, Management Information Systems, and a MBA in Finance. His
book, “IT Compliance and Controls: Best Practices for Implementation” published
by John Wiley and Sons, is globally available.

!
It is my greatest desire to have meaning and make a difference in the world. I hope
this investment of time and knowledge serves you well.

!
Thank you,


James DeLuccia IV
!
SONY BREACH SURVIVAL GUIDE

!19

HOW NOT TO BE HACKED

!
!
!
!
!

!
!
!
!
!
!
!
!
!
!
!
!
!

!
!
!
!
Signup at www.hntbh.com for latest book snippets

!
Join www.Facebook.com/hntbh for regular
insights and the community!

!

!
!
!
!
!
!

SONY BREACH SURVIVAL GUIDE

Wait!! There are 8
more valuable tasks.
Please follow links to
purchase book from
Amazon, kindle, and
online.
!20