RKL eSolutions Blog Trends and Insights

Cyber security: Is your business under attack?

Last week, I presented at MANTEC’s Business Growth Conference in Harrisburg, PA. Of particular interest to me was the keynote presentation on Cyber security. Speaker, Ron Plesco, National Lead for KPMG Cyber Investigations, shared enlightening – and intimidating – statistics about cyber security threats, the costs to business and how to protect your organization. Below are some common sense, but often forgotten, rules to implement and follow.

As connected devices increase with the Internet of Things (IoT), the threat becomes more real and personal. Hackers can gain access to employee information, personal information, and intellectual property including your secret recipes, customer and supply data, and manufacturing specifications unique to your business.

 

Real-time cybersecurity attacks globally Sites like http://map.norsecorp.com/#/, show real-time cybersecurity attacks globally.

 

What can you do?

  • Exercise Caution. The first level of defense begins at the point of entry for most users.
  • Do not open emails from unknown senders.
  • Do implement passwords with varying levels of complexity and update them frequently.
  • Do not visit questionable websites.

Keep in mind, anything with an IP address establishing internet connectivity can be accessed.

  • Document, Communicate, and Enforce corporate internet and email usage policies. Make sure your organization documents and communicates internet usage and email usage policies. Constant communication is important along with the message that the policies apply to all technology usage on company issued equipment even outside of the office.
  • Be diligent. If your site gets hacked your company’s intelligence could be for sale on the black market. Use sites like pastebin.com and www.shodan.io to see if your corporate information has been breached or might already be marketed. Remember your domain is exposed anytime an employee visits external websites and submits or responds to requests for information.
  • If you think you’ve been hacked, call an expert. Typically, companies may not be aware they’ve been hacked until several months have passed by. If you think your infrastructure has been compromised, you’ll need a comprehensive plan to restore confidence with your stakeholders along with new security protocols. Rely on the experts to help you identify and remedy the fraud.

Hackers are targeting corporations for valuable information.  In Ron’s keynote, he reiterated that this is not limited to Big Box, Healthcare, or Government institutions. In fact, US Manufacturers are being targeted for manufacturing intellectual property that can be manipulated or reproduced overseas for competitive advantages. Partner with professionals to protect your organization. Review our blog feed for more articles on cyber security.

RKL Team

Written by RKL Team

Since 2001, RKL eSolutions has helped growing companies maximize their technology resources and investment. Over the years, we have helped hundreds of small and medium sized businesses as their strategic business partner. We specialize in the needs of Entertainment, Software & SaaS, Professional Services, Manufacturing, and Non Profit organizations. Our experienced consultants have a passion for making every facet of your business successful and are intent on building a long-term relationship with every client.