{"id":15764,"date":"2014-10-08T13:40:49","date_gmt":"2014-10-08T17:40:49","guid":{"rendered":"https:\/\/www.saratoga.com\/saratogabusinessjournal\/2014\/10\/it-experts-vital-security-issues-not-always-simple-need-to-be-addressed.html"},"modified":"2014-10-08T13:40:49","modified_gmt":"2014-10-08T17:40:49","slug":"it-experts-vital-security-issues-not-always-simple-need-to-be-addressed","status":"publish","type":"post","link":"https:\/\/www.saratoga.com\/saratogabusinessjournal\/2014\/10\/it-experts-vital-security-issues-not-always-simple-need-to-be-addressed\/","title":{"rendered":"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed"},"content":{"rendered":"
Computer system security lapses periodically
\nmake headlines, causing serious problems
\nfor those whose systems have been violated. It
\nshould make all businesses take notice.
\nBut local IT experts say that while the ramifications
\ncan be severe, steps can be taken to
\nsee it doesn’t happen.<\/p>\n
Alex T. Silverstein, president of Unified
\nDigital Group LLC in Ballston Spa, noted
\nthat “every business that retains electronic
\nrecords of any kind should consider whether
\nor not portions of those records need to be
\nencrypted.”<\/p>\n
“We hear about the hacking and theft of
\ncredit cards every night on the news,” said
\nMark Shaw, founder and president of Stored
\nTechnology Services (StoredTech). “For the
\nsmall business owners like us, there are a
\nnumber of lessons to learn from these events.”
\nHe stressed that an upcoming issue involving
\nMicrosoft servers needs to be addressed soon.<\/p>\n
Jared Humiston, president of Adirondack
\nTechnical Solutions, said security needs to
\nbe thought of in layers and businesses should
\nconsider that approach.
\nEach expert provided the Saratoga Business
\nJournal with some advice.<\/p>\n
Shaw on Secure Servers<\/strong>:<\/p>\n While it’s pretty clear that these attacks Microsoft is focusing on security for its While Windows XP dying made a splash this The single largest event for many businesses Can your hardware handle the upgrade? If Is your server under warranty? Older servers Will all your applications work on the new What other functions does that server provide? Upgrading an operating system on your This is just one of many things that will Humiston, Layering Security<\/strong>:<\/p>\n As a solutions oriented company with a The damage done from a cyber-attack could Security needs to be thought of in layers. These policies should be reviewed and Technology is ever changing and your Cloud computing, electronic purchasing and We encourage these businesses to contact Silverstein on Encryption<\/strong>:<\/p>\n A company can incur significant financial In layperson’s terms, encryption is the process Encryption is performed by running Most strong forms of encryption usually If your institution is in the habit of storing Mark Shaw, founder and president of Stored Technology Services (StoredTech) Computer system security lapses periodically make headlines, causing serious problems for those whose systems have been violated. It should make all businesses take notice. But local IT experts say…<\/p>\n","protected":false},"author":121,"featured_media":20313,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[57],"class_list":["post-15764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-office-technology-e-commerce","tag-business-news"],"yoast_head":"\r\n
\nwere coordinated against targets like large
\ncorporations there are takeaways for all of us.
\nWhat is the largest item for security coming up for many businesses? There is an easy answer.<\/p>\n
\nServer 2003 operating system. This is going end-of-life July 14, 2015, which means that
\nservers in many environments will need to
\nbe replaced and migrated to a newer version.
\nMicrosoft will no longer provide updates or
\nfix security flaws exposed after that date. In
\nessence the servers are sitting ducks.<\/p>\n
\nyear, this issue is even larger. Servers are the
\nbackbone of many networks and if they are not
\nupgraded, everything from files, applications
\nand more could be compromised and used by
\nthose looking to breach a company’s security.<\/p>\n
\nis this end-of-life for the core of their
\nnetworks. Upgrading or replacing a server
\noperating system requires more than just
\nbuying a new version and installing it. There
\nare a number of things to consider:<\/p>\n
\nyou have a server that is five-plus years old,
\ndoes it have the horsepower to run the new
\noperating system? Server 2003 would run with
\nmuch lower requirements then the new 2012
\nR2 editions.<\/p>\n
\nwill be out of coverage and it becomes a
\nbusiness decision to continue to utilize hardware
\nthat cannot easily be repaired.<\/p>\n
\noperating system? Often applications like
\nQuickbooks need to be upgraded to the latest
\nversion. If this is not planned for it can cause
\na slowdown in the upgrade path and increase
\nunexpected costs.<\/p>\n
\nDoes it run the company’s printers? Does
\nit allow users to connect remotely? Does it run
\nthe email services for the company? Defining
\nthese items and addressing how they will work
\nmoving forward is fundamental to a successful
\ninstall of a new server and operating system.<\/p>\n
\nhome computer is far less intensive than the
\nupgrade of an operating system on a server.
\nLooking at these issues can make the process
\na lot less painful.<\/p>\n
\nhelp ensure that a company is protected, other
\nitems like proper virus protection, firewalls,
\nVPN’s, policies, mobile device management,
\nweb security, and more will make the environment
\nless prone to vulnerabilities. Discussing
\nWindows Server 2003 going end of life, should
\nbe on every company’s road map for 2015, and
\nthe time to plan for that is now.<\/p>\n\n<\/div>\n
\nfocus on security, we have seen cyber crime
\nreach an all-time high in recent years. In many
\ncases, small business owners that do not work
\nwith a security focused IT firm find out how
\nvulnerable their data is when it is too late.<\/p>\n
\nprove catastrophic for a business. We have
\nseen the negative results of cyber-attacks on
\nsome of the larger companies. These companies
\nhave taken losses in the tens of millions
\nof dollars and have lost the public’s confidence,
\nfurther increasing the damage done to their
\norganization.<\/p>\n
\nA simple password that you change every 90
\ndays is not enough. Those layers should go
\nbeyond the out of the box virus protection and
\nfirewalls. Companies also need to consider
\nhow their employees are using their technology
\nin and out of the office and include social
\nengineering into their security policy.<\/p>\n
\nupdated on an annual basis to ensure they are
\ncurrent. Security should be an organizational
\neffort with the sole goal of improving the company’s
\nsecurity posture and protecting their
\ndata and their client’s data.<\/p>\n
\norganization should be prepared for change.<\/p>\n
\nmillions of mobile devices have increased the
\nnumber of targets for cyber criminals. It is
\nrecommended that companies with high-risk
\ndata or that may fall in a regulated industry,
\nhave annual risk assessments and vulnerability
\nassessments completed to make sure
\nthe improvements made to your environment
\nthroughout the year have not opened up new
\nholes in which you can be exploited.<\/p>\n
\ntheir local IT Service provider for the proper
\nguidance in implementing a security program
\nin their organization.<\/p>\n\n<\/div>\n
\nand legal penalties if any personal, financial,
\nor other sensitive information is exposed to
\nunauthorized parties.<\/p>\n
\nby which clear text, that is, data stored
\nin its original, unmodified state, is rendered
\nunreadable by humans and, more importantly,
\nun-hackable (in most cases) by sophisticated
\ncomputer programs designed to steal that
\ninformation.<\/p>\n
\nspecialized, mathematical programming
\nalgorithms that manipulate your clear text,
\nresulting in protected cypher text. If you are
\nnot a programmer or database administrator,
\nyou will most likely need to hire one to accomplish
\nthis task for you.<\/p>\n
\nwork by way of a pair of digital keys, known
\nas a public and private key. Your public key
\nis used to encrypt your data. You can share
\nthis key with anyone who needs to create
\nencrypted data for you. Your public key cannot
\nbe used to decrypt (that is, to un-encrypt)
\nyour data. Only the private key can be used
\nto perform decryption; therefore, you should
\nnever share it with any unauthorized parties.<\/p>\n
\nsensitive information in clear text in a database,
\nspreadsheet, or other electronic format, it is up
\nto you, as a principal of the company, to take
\naction as soon as possible. The cost of hiring
\na professional to perform data encryption is
\nsurprisingly low (since it is a common task), the
\nreduction of risk is immediate, and your return
\non investment exceedingly high.<\/p>\n","protected":false},"excerpt":{"rendered":"