2
TECH NEWS Cyber Attack Trends for 2015 Where is the Weakest Link? It is the end user, the naive employee as opposed to the better protected network server administrators. Zeroing-in on the employee’s workstation has turned out to be much easier than expected. Once the hacker’s foot is in the door, the next step of targeting deeper into your network is much less a challenge. You see, employees today want to be technically savvy. Many of them bring their own device (BYOD). This can range anywhere from a laptop, to a tablet, to a smart phone, to something as seemingly benign as a USB thumb drive. All of which are removed from the worksite on a daily or weekly basis and exposed to who knows what in the employees home. So don’t bother wasting your time worrying about locking your office doors at night. Your employees have a key and the code to your alarm. They are making copies and sharing with everyone obliviously. EDUCATION BYTE How is Your IT Backside? Most businesses truly believe that they are well protected from unauthorized cyber invaders. When asked, the average executive shrugs his/her shoulders and replies, “…Our own IT guys have it under control”. In reality, Alberta business report 160 network breaches per year. So how many other unauthorized penetrations go unreported? Considering the Privacy Commissioner will be breathing down your neck if personal customer information hits the web, it may be time to take a closer look at how you cover your “ass-ets”. Besides the threat of being sued for millions of dollars, the loss of customer credibility and the sheer inconvenience of repairing the damage from private information loss, being IT security complacent increases risk. Nevertheless, it is unlikely you can do without technology. You need access to the internet and you use computers for proprietary business intelligence. Therefore, you have entered the cyber arena whether you like it or not. Are you ready for the fight, or will your systems be sliced apart by the byte- gladiators? If you’re plugged into a router / modem which then connects to the World Wide Web (www) you can expect to encounter up to 90 million security events per year. Consider this the same as someone rattling the front door of your business 246,000 times per night. Eventually, if you don’t re- enforce your perimeter protection the door will open. Traditionally business moguls and government agency conglomerates have been the focus of technology exploiters. Penetrating their networks with high volumes of confusion, destruction and armored pathogens has successfully caused havoc. But the chance of their apprehension is increasing, so these same international experts have dug further underground. Yet their passion to be recognized as the best systems disruptor remains. The strategy of the hacker this year will be to attack the weakest link in the IT network chain. March 2015 Corporate Newsletter Issue 1 Bug Out! Privacy screens not only help protect the information on your screen, they also help protect the screen itself by adding a layer of physical defense from scratches and grime.

Trinus Corporate Newsletter 1 March 2015 Special Printer Version

Embed Size (px)

Citation preview

Page 1: Trinus Corporate Newsletter 1 March 2015 Special Printer Version

TECH NEWS

Cyber At tack

Trends for 2015

Where is the Weakest Link?

It is the end user, the naive

employee as opposed to the better

protected network server

administrators. Zeroing-in on the

employee’s workstation has turned

out to be much easier than

expected. Once the hacker’s foot is

in the door, the next step of

targeting deeper into your network

is much less a challenge. You see,

employees today want to be

technically savvy. Many of them

bring their own device (BYOD). This

can range anywhere from a laptop,

to a tablet, to a smart phone, to

something as seemingly benign as a

USB thumb drive. All of which are

removed from the worksite on a

daily or weekly basis and exposed

to who knows what in the

employees home.

So don’t bother wasting your time

worrying about locking your office

doors at night. Your employees

have a key and the code to your

alarm. They are making copies and

sharing with everyone obliviously.

EDUCATION BYTE

How is Your IT Backside?

Most businesses truly believe that they are

well protected from unauthorized cyber

invaders. When asked, the average

executive shrugs his/her shoulders and

replies, “…Our own IT guys have it under

control”. In reality, Alberta business report

160 network breaches per year. So how

many other unauthorized penetrations go

unreported? Considering the Privacy

Commissioner will be breathing down your

neck if personal customer information hits

the web, it may be time to take a closer

look at how you cover your “ass-ets”.

Besides the threat of being sued for

millions of dollars, the loss of customer

credibility and the sheer inconvenience of

repairing the damage from private

information loss, being IT security

complacent increases risk. Nevertheless, it

is unlikely you can do without technology.

You need access to the internet and you

use computers for proprietary business

intelligence. Therefore, you have entered

the cyber arena whether you like it or not.

Are you ready for the fight, or will your

systems be sliced apart by the byte-

gladiators?

If you’re plugged into a router / modem

which then connects to the World Wide

Web (www) you can expect to encounter

up to 90 million security events per year.

Consider this the same as someone rattling

the front door of your business 246,000

times per night. Eventually, if you don’t re-

enforce your perimeter protection the door

will open.

Traditionally business moguls and

government agency conglomerates have

been the focus of technology exploiters.

Penetrating their networks with high

volumes of confusion, destruction and

armored pathogens has successfully caused

havoc. But the chance of their

apprehension is increasing, so these same

international experts have dug further

underground. Yet their passion to be

recognized as the best systems disruptor

remains.

The strategy of the hacker this year will be

to attack the weakest link in the IT

network chain.

March 2015 Corporate Newsletter Issue 1

Bug Out!

Privacy screens not only help

protect the information on your

screen, they also help protect the

screen itself by adding a layer of

physical defense from scratches

and grime.

Page 2: Trinus Corporate Newsletter 1 March 2015 Special Printer Version

Contact Us a t info@tr inustech.com

TRINUS FACT

Did you know we select

our experts carefully?

Our Director of the IT Security

Department has been a law

enforcement professional for 35

years. Bradley Siddell was a sworn

member of three separate police

agencies, the RCMP, the Edmonton

Police Service, and most recently

as the Deputy Commissioner with

the Royal Montserrat Police

Service in the Caribbean. I know,

it’s a tough life but someone has to

fight crime and/or evil in the

tropics?

Today Bradley tackles IT Security

threats and consults on safety and

security stewardship worldwide.

Offering a variety of case and

records management best

practices, Bradley will partner with

your agency to ensure you comply

with all mandatory security

requirements.

Scheduled Training

Education is a critical element in

the fight against unintentional loss

of private information and network

attacks. Whether it is your

employee group or managers and

executives, the affordable

awareness training provided by our

IT Security Team will ensure you

are on the right track.

Section 34 of the Alberta Personal Information Protection Act (PIPA) states:

IT SECURITY – It’s the Law!

“…An organization must protect personal information that is in its custody or under its

control by making reasonable security arrangements against such risks as unauthorized

access, collection, use, disclosure, copying, modification, disposal or destruction...”

What are these mandatory security safeguards? We know!

WARNING: THIS MIGHT FRIGHTEN YOU

ARE YOU?

compliant

with Federal

and Provincial laws

related to

IT Security and

Information Privacy?

F i n d O u t H o w t o R e c e i v e t h i s “ S e a l ”