<img src="https://ws.zoominfo.com/pixel/PMY3ZvbpZt27ywWwZSBB" width="1" height="1" style="display: none;">

Business Copiers & Printers

EO Johnson offers multifunction copiers and printer solutions that are cost effective and easy to use. Trust in the exceptional service and rapid response time of our knowledgeable local service technicians.

Production Print & Finishing

EO Johnson is your one-stop shop for digital production presses, wide-format printing, and finishing equipment. We provide local service and support and have the most technologically advanced Customer Experience Center in the Midwest.

Locknet Managed IT

Locknet Managed IT is a Managed Security Service Provider (MSSP) that is both FFIEC-examined and SOC 2 Type 2 audited. We support businesses in Wisconsin, Minnesota, Iowa, and Illinois with technology strategies and solutions to improve your security position. 24/7/365 remote and onsite support.

locknet_logo

 

Digital Transformation Solutions

EO Johnson’s digital transformation consultants have solutions for every size and type of business. Reduce paper and secure your files with our bulk document scanning. Then streamline your business with process mapping and secured document management.

Resources

Gain insights and expand your knowledge with our collection of tools and resources. Stay informed about the latest in business technology, print services, and process improvement. 

‘Blocking and Tackling’ Your Cyber Security—Lombardi Had It Right

4 min read

hero_angles
Locknet Managed IT

Vince Lombardi said, "Football is two things. It's blocking and tackling. I don't care about formations or new offenses or tricks on defense. You block and tackle better than the team you're playing, you win."  As a Green Bay Packers fan, I am prone to using quotes from Coach Lombardi and fortunately, Cybersecurity Awareness Month falls squarely in the middle of the NFL season.

To be sure, Vince Lombardi did not have Cybersecurity in mind when he spoke about 'blocking and tackling’ and while this may be a bit overused as a sports metaphor, it really does describe the first line of defense small to midsize businesses must use to protect their IT security in light of today’s threats.

Security can’t be an afterthought.

When speaking to small business owners and executives about their cyber risk, I often hear a common theme of “why would hackers come after us, we’re a small company?”  If this is how you are thinking, you are clearly not alone.  In a large survey of small businesses, 87% said they do not believe they are at risk for an attack. Yet, according to the U.S. Securities and Exchange Commission, half of small to midsize businesses experience cyber-attacks.  Why?  Small businesses are usually easier targets.

Here are some findings from the 2018 Verizon Data Breach Investigations Report:

  • 58% of breaches are small businesses.
  • 36% of breaches are personally identifiable information (PII) like name, social security, birth date, place of birth…
  • 49% of malware was installed by email.

Don’t be an easy target.

Most hackers are motivated by money. Their goal is to steal and sell your data and they’ll take the path of least resistance to get it. Are you making their job easy and essentially handing hackers the keys to the store?

Security breaches happen quickly. In those 93% of cases where data was stolen, systems were compromised in minutes or less—and in most cases, victims didn’t’ find out about the breach for months.  In other words, by the time a business is hacked, it is too late to start thinking about prevention. That’s like remembering to get the flu shot after coming down with the flu.

Know your risks.

Think about your own organization, where are you most vulnerable? How do the vulnerabilities impact your products, services or regulatory position? Do you have enough measures in place to shrink the threat surface hackers can exploit?  In other words, how would a hacker see your organization from the outside and how would they get in?

“It’s no longer enough to be content that things are secure. Systems must be robust and able to withstand glitches in the infrastructure,” says Gene Fredriksen, chief security strategist for PSCU, the largest credit union services organization in the country. “If we look at recent breaches…the one thing we cannot afford to do is forget how to block and tackle. We’re not just talking about security anymore; we’re talking about resilience.”

As threats get more complex, resilience requires more ‘complex’ defenses.

Storage of much larger amounts of data, increased use of mobile devices, the need for anywhere and anytime access to data are just a few of the technology issues that add to security complexity—and bad actors thrive in complexity.

What’s more, hackers use methods that are not always obvious nor easy to detect.  And, they are very resourceful.  They use press releases, social media and company websites to learn information to craft emails that employees are likely to open.  Personal information like schools attended, favorite movies, pets, family members, friends, birthdates, job history, and hobbies can be found in simple searches that help hackers break passwords.

Blocking and tackling—stay strong on doing the basics.

Back to knowing where you are vulnerable as an organization, can you answer that question?  Most companies don’t have the IT security expertise, so don’t feel bad.  As a result, more and more small businesses are relying on managed security services to compensate to help supplement their in-house skills. In addition, most businesses should be investing more in preventative IT security than historically has been done.  Which brings us back to our ‘blocking and tackling’ metaphor.

Due to the increasing complexity of hacking methods, there is a temptation to look past the basics to newer, and typically more expensive, security technology.  While there can be a value to these products, before any company looks at them, managed securityexperts continue to ring the warning bells on the importance of maintaining basic system security. Many breaches are avoidable with well-known security measures such as:

  • Prompt Microsoft and Third-party Patchingthat when done well, will render most attacks via malicious email links and malware infected attachments (such as ransomware) useless. Most of these attacks use well known exploits that have already been addressed, but only if patched.
  • Password Policies that require rules such as password complexity, expiration dates, length, and lockouts so that passwords are difficult to crack.
  • Encrypting Sensitive Data at rest and in transit to make data next to useless if stolen.
  • Two-Factor Authentication for critical systemsto limit the damage of lost or stolen password.

And while it technically is not a security measure, ‘blocking and tackling’ also includes having effective backups in place in case all security measures fail, and your system needs to be restored from a backup.

Get everyone involved in keeping your organization’s security safe.

Last, but certainly not least, is employee training. Technology can’t do it all and even the best technology can be evaded by the actions of one careless employee.  Don’t assume that your employees know what they should look for in malicious emails, our experience is that most don’t and keeping everyone up to date requires regular training.  Fortunately, there are informative and cost-effective tools now available to both educate your employees, as well as to test how well they have learned the material.

It takes commitment from people at all levels of your organization to keep bad actors from knocking on your system doors. Lombardi said, “The achievements of an organization are the results of the combined effort of each individual.” Like football, security is a team effort!

angle_down_right
click_Icon

angle_up_middle

No Comments Yet

Let us know what you think