Here’s another roundup of some really informative articles that have been published on the Onepath web site. I hope you will check them out as there is some truly great content here from some real industry luminaries. Let me know what you think of these pieces. We love feedback and knowing what we’ve done well and what you are interested in learning more about. Enjoy!
The Business Side of Cybersecurity – Keynote Presentation to Georgia Construction Conference
Given by Greg Chevalier
With all the big companies in the news for data breaches or other cyber security “incidents,” does the average mid-size business really need to worry about cybersecurity? In his keynote presentation to the 2018 Georgia Construction Conference at the Cobb Energy Centre in Atlanta last week, Greg Chevalier helped a group of finance and operations executives understand the answer is a definitive “yes,” and not just to protect yourself directly, but also indirectly through your trading partners.
Network traffic has grown rapidly; your cybersecurity needs to evolve with it. Network traffic has grown exponentially over the last 20 years, driven not just by the adoption of smartphones and laptops for personal use, but by the explosive growth of machines on the network. Not just servers, but firewalls, edge routers, webcams, wireless access points, vending machines and thermostats. Each of these devices presents something that needs to be either protected or potentially defended. In the ‘90s, intrusion prevention systems were largely sufficient to deal with the individuals who may be bad actors trying to attack a manageable number of machines using fairly common security frameworks. But with the rise of so many different machines on the network, the number of security frameworks has grown just as fast. This means your cybersecurity has to now solve for an exponentially greater number of potential issues than 10 years, or even 5 years ago. As a business executive, you have to consider when was the last time you made a meaningful update to your IT security infrastructure? In response, various industry groups and regulatory bodies have developed security regulations such as PCI (payment cards), HIPAA (healthcare), GLBA (banking), FINRA (financial services) as well as industry standards such as ISO 27001/2, SOC Type I/II,III, and NIST CSF to help companies keep their data and their networks secure. [Continue reading…]
10 Ways to Improve Your Conference Room Meeting Experience
By Michael Lane
The first 10 minutes of a 30 minute meeting all-too-often look like this:
“How do we connect my laptop to the TV?”
“Can someone get Sarah? She knows how to turn on the projector.”
“I think I have the wrong meeting link; here let me find that in my email.”
“While I’m looking, can someone go ahead and dial us in on the speakerphone?”
“There we go. Can everybody hear me? No? Here, I’ll slide over closer to the microphone.”
By the end of the meeting, you may not even realize you’ve run out of time until someone pops their head through the doorway because they’ve booked the room for the next block of time, and now you’re delaying the start of their meeting.
$37 billion dollars is lost annually to poor meetings, according to the U.S. Bureau of Labor Statistics.
Audiovisual (AV) has changed from a speciality area to a business-critical application. Businesses need to interact with remote workers, remote clients, and remote vendors, so presentation and collaboration technology is increasingly part of how we communicate. AV equipment is therefore becoming as central to running your business as other communications like phone or email. The shift to AV being business-critical in nature has in turn created a demand for reliable, sustainable, and repeatable AV solutions. [Continue reading…]
Q&A: What Can We Learn from the Atlanta Cyberattack?
By Patrick Kinsella
In light of the recent and ongoing ransomware cyberattack affecting the City of Atlanta’s IT systems, we sat down with Onepath’s Senior VP of Engineering and Technology Patrick Kinsella, to get his perspective on the events of the last week. The ransomware attack began on Thursday, March 22, and affects almost half of the city’s systems, from Municipal Courts to Watershed Management. On Tuesday, March 27, city employees were advised to turn their machines back on. By Friday, a few systems were slowly starting to come back online, but a couple were still not back up.
Q: What is ransomware?
A: It’s the information technology version of someone breaking into your home, locking you out of it, and demanding a ransom to regain entry; all the while you hope your belongings are intact when you’re able to return. In the IT world, the items behind held captive could be personal health information (PHI), or other personally identifiable information (PII), which may actually belong to your business’s customers or stakeholders.
Q: When a ransomware cyberattack happens, what are the first things a business, or in this case a city, usually does to respond?
A: The first thing is, do everything you can to stop the bleeding. You determine what you need to shutdown, and what backups need to be stopped from running to avoid poisoning the last good copy, assuming you’ve been diligent in running backups. In a different incident, for example, Hancock Health shut everything off after being hit with ransomware—computers, backup scripts—within 90 minutes. For the City of Atlanta, they seem to have followed that procedure as well. [Continue reading…]
Onepath Launches Cybersecurity Self-Assessment Tool
Created by our Web Dev Team
Onepath has created a cybersecurity self-assessment tool to help businesses establish a baseline of their current security level and posture. The questions are around the basics – the blocking and tackling needed to establish an information security foundation. It may be just a start, but it could be that critical first step you take to get your business on a path toward cyber protection. [Take the assessment…]