{"id":1611,"date":"2025-01-16T16:38:59","date_gmt":"2025-01-16T16:38:59","guid":{"rendered":"http:\/\/10.212.0.135\/?p=1611"},"modified":"2025-01-16T16:39:01","modified_gmt":"2025-01-16T16:39:01","slug":"cybersecurity-in-uncertain-times","status":"publish","type":"post","link":"https:\/\/kevinjgoodman.com\/index.php\/2025\/01\/16\/cybersecurity-in-uncertain-times\/","title":{"rendered":"Cybersecurity in Uncertain Times"},"content":{"rendered":"\n<p>Navigating the Covid-19 virus in the digital age is transformational. There are changes in the way we work, including working from home, increased cybersecurity risks, and requiring additional training and enhanced need for recovery. Even seemingly small measures, such as teaching employees what not to click on, will help companies protect their information.<\/p>\n\n\n\n<p>How do we protect IT systems and keep businesses running secure? The&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20240719064137\/https:\/\/staysafeonline.org\/\"><strong>National CyberSecurity Alliance<\/strong><\/a>&nbsp;provides a great tool and resources to help companies of all sizes fine tune their existing cyber defense.<\/p>\n\n\n\n<p>Now is the time to train everyone to create a barrier mindset around your business like a neighborhood watch: Teach people. They are eager to help. When in need, hire experts in the field to prevent and mitigate attacks. You do not want to have to shut down your revenue systems. Resiliency will stop more attacks and help you find, fix and reduce future breaches.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Know the Basics&nbsp;<\/strong><\/h2>\n\n\n\n<p>Get to know the&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20240719064137\/https:\/\/www.crainscleveland.com\/guest-blogger\/understanding-7-pillars-cyber-hygiene\">7 pillars of cybersecurity and cyber hygiene<\/a>. There will be ever increasingly advanced AI cybersecurity software and protection and detection techniques. However, if something gets through, you still need to be able to quickly recover your data. Review backups, including multiple layers of backups, san snapshots with replication, local backups stored in a network isolated location, and backup copies stored offsite online and offline. You want to have multiple options to recover your systems when disaster strikes.<\/p>\n\n\n\n<p>Many people assume that if their data is in the cloud it is completely protected.&nbsp; Although there are redundancies, they are not necessarily backups. For example, Office365 should be backed up from the cloud to another location. If Microsoft has an outage resulting in data loss, you want to ensure you can recover from that disaster when they are back online.&nbsp; If you use a product such as Veeam and have the data backed up to a Veeam Service Provider, your data will be protected and available to recover should you need it. Review your backup strategy and test it.<\/p>\n\n\n\n<p>In addition to backups, it is important to have your systems and applications replicated to a different availability zone.<\/p>\n\n\n\n<p>\u201cThis will ensure that an outage in one availability zone doesn\u2019t take your business offline.&nbsp; These outages can be devastating to businesses with a large amount of revenue being lost during the outage. These outages do occur and can sometimes take a while to resolve,\u201d according to Roger Mitan, CTO&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20240719064137\/https:\/\/www.bluebridgenetworks.com\/\">BlueBridge Networks<\/a>.<\/p>\n\n\n\n<p>He advises that companies train their workforce on cybersecurity tactics.<\/p>\n\n\n\n<p>\u201cA large number of breaches don\u2019t necessarily come from advanced technical hacking techniques like the movies portray.&nbsp; In these cases, increasingly sophisticated phishing, using emails, texts, messaging apps, and phone calls are used to convince a user to open something, download something or provide details they shouldn\u2019t,\u201d he said.<\/p>\n\n\n\n<p>Training is key to preventing these types of attacks. If it sounds a little off, it probably is.&nbsp; Always call the source directly using a number you already know.<\/p>\n\n\n\n<p>There are many reasons to remain vigilant. When crises occur, hackers do not take a vacation. The trend for ever-increasing cybersecurity disorder continues, and the end is not in sight. According to Tim M. Opsitnick, Executive Vice President and General Counsel of&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20240719064137\/https:\/\/www.tcdi.com\/\">TCDI&nbsp;<\/a>,&nbsp;factors adding to that trend include:<\/p>\n\n\n\n<p>1) the increasing harm and sophistication of the hackers,<\/p>\n\n\n\n<p>2) the indifference to the harm of hacking on the global economy by individuals, corporations and nation-states, and<\/p>\n\n\n\n<p>3) the lack of sophisticated cybersecurity resources.<\/p>\n\n\n\n<p>He believes to that end, \u201cas if encrypting data and holding it ransom for payment was not enough, hackers are now following through on the threat to release data publicly if the ransom is not paid. In addition, the next evolution of harm and attacks will include the use of automated hacking and artificial intelligence tools to learn to attack without human interaction.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Follow the Legal Advice<\/strong><\/h2>\n\n\n\n<p>It has never been more important to make sure that your organization complies with the burgeoning new body of laws, rules and regulations on cybersecurity.<\/p>\n\n\n\n<p>\u201cKnow the law, know your obligations, know the potential penalties, and know the risks of non-compliance,\u201d according to Michael Stovsky, Partner, Chair, Innovations, 3iP Group at&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20240719064137\/http:\/\/www.beneschlaw.com\/\">Benesch<\/a>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Elevate cybersecurity issues to the highest level of your board and C-suite.\u00a0 Consider forming cybersecurity committees and evaluate cybersecurity risks at the same level you would evaluate the other material risks that your business faces every day.<\/li>\n\n\n\n<li>If you suffer or suspect you have suffered a cybersecurity breach, do not sit on it.\u00a0 Take immediate steps to stop the threat, mitigate the harm, and contact outside technical and legal professionals who can help you as soon as possible.<\/li>\n\n\n\n<li>Review your insurance coverage and purchase adequate cybersecurity coverage for your organization.<\/li>\n\n\n\n<li>Put a cybersecurity risk assessment on your company\u2019s to-do list right away. Don\u2019t wait.\u00a0 Don\u2019t procrastinate.\u00a0 Take cybersecurity risk proactively and it will substantially reduce your risk and the potential costs to your business if you do suffer a breach.<\/li>\n<\/ul>\n\n\n\n<p>The loss sustained from a breach is not just monetary. It can be reputational and crippling. Be proactive \u2013 especially in these uncertain times.<\/p>\n\n\n\n<p>(<em>Kevin Goodman is Managing Director and Partner with&nbsp;<\/em><a href=\"https:\/\/web.archive.org\/web\/20240719064137\/https:\/\/www.bluebridgenetworks.com\/\">BlueBridge Networks<\/a><em>, a cloud data center and managed services business headquartered in downtown Cleveland<\/em>.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Navigating the Covid-19 virus in the digital age is transformational. There are changes in the way we work, including working from home, increased cybersecurity risks, and requiring additional training and enhanced need for recovery. Even seemingly small measures, such as teaching employees what not to click on, will help companies protect their information. How do [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1612,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/kevinjgoodman.com\/wp-content\/uploads\/2025\/01\/CS-Cloud-750x450-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts\/1611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/comments?post=1611"}],"version-history":[{"count":1,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts\/1611\/revisions"}],"predecessor-version":[{"id":1613,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts\/1611\/revisions\/1613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/media\/1612"}],"wp:attachment":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/media?parent=1611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/categories?post=1611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/tags?post=1611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}