Saratoga.com logo
Saratoga.com logo
  • Places to Stay
  • Things To Do
  • Food & Drink
  • Events
  • Businesses
  • Travel Guides
Saratoga Business Journal
  • Home
  • New Businesses
  • Business News
  • Business Reports
  • Business Briefs
  • Business Registrations
  • Personnel Briefs
  • Contact Us
Home  »  Business Reports  »  Tech Security In An Organization
Business Reports

Tech Security In An Organization

Posted onAugust 7, 2014

By Jared Humiston

Maintaining a secure business is no small
task. With so much demand on everyone’s time
it becomes easy to overlook the small details
that protect your business. This task should
never fall on one person’s shoulders but rather
on the organization as a whole. Here are some
helpful tips to keep your organization secure.

It is widely believed that anti-virus, a
firewall, complex passwords and some web
content filtering software will keep you safe
a secure. While these are all critical components
of keeping data secure, these are only
part of the equation that is security. Law
enforcement experts estimate that 50 percent
of breaches result from employees misusing
access privileges, whether maliciously for
unwittingly.

You have to be as conscientious about
both internal and external threats. User with
elevated privileges can accidentally delete
data that causes harm to the organization.

These acts do not have to be intentional to
be harmful. Periodically reviewing who has
access to what information. We come across
a lot of situations where all company data
is put into one folder and shared out. This
gives users access to files that should remain
confidential.

Another area of security that is often over
looked is training the “human firewall.” Most
spyware is the direct result of user behavior.

This could be using Facebook, checking personal
e-mails, instant messaging programs
and other user/employee provided devices.
Have a policy, plan and/or solution in place to
address these areas is necessary in any sized
organization.

Educating and training your employees on
the dangers of these behaviors can help the
user identify a potential threat before clicking.
A way that an employee can commonly
be socially engineered is outlined in the following
example: If a person comes in for an
interview and they ask the front desk person
to take this USB stick and print out the file
called resume real quick because they were
running late because their kid was sick.

Your employee wants to help, so they plug
it in, pull up the resume and print it out
and hand it to the interviewee and they are
delighted. The person goes into the interview
and comes out says thanks and that’s that.
What the employee did not know is that the
USB stick contained malicious code that will log all of their keystrokes and send them to
the attacker. It will gather passwords and
could even provide a backdoor into the network.

If a policy was in place to never accept
a devise from non-employees or had a device
control application been in place, this could
have been prevented. The employee is as
vulnerable as the desktop or laptop.

You see security is a layered approach and
it is different for every organization. Not to
beat analogies to death in this article but this
analogy describes security in laymen’s terms.
When you go to bed at night, you would never
leave your front door wide open and lock just
your bedroom.

This would allow the would be attackers\
hackers free access to your house. Normally,
you lock the all the doors and may even have
a bolt to provide extra security. Closing these
doors provides another barrier for them to
have to break down to gain access. Hearing
the racket will prompt you to call police.

They now have to break down a secondary
bed room door.
Having two doors should provide time for
the police to show up and thwart off the attacker
or eliminate the threat all together.
If you are running out of time, you have a
secondary escape route out the window.

Without these secondary measures in place,
something much worse could have happened.
The same applies in your business environment.
You want to have a plan of action on
how to prevent attackers from gaining access
to your network and be prepared for if they do
and how to properly respond to eliminate the
damage to your files and reputation.

Security does not come prepackaged, it is
tailored to each and every network environment,
large or small. It includes every member
of the organization to ensure that your business
is safe. Firewalls are good until someone
initiates a download. Web content filtering is
good except for when a policy is forgotten to
be applied. The “human firewall” may know
that the .zip file from an unknown source in
their personal Yahoo e-mail should not be
viewed at work because they were trained
properly.

This is why you scratch your head at night
wondering why one of your users was down
half the day because of a virus when you paid
for anti-virus and a firewall.

Humiston is president of Adirondack
Technical Solutions in Argyle.

Previous Article Coldwell Banker Offices In Carthage And Watertown Are Merging With RealtyUSA
Next Article Social Media Is Thorny For Employers
Subscribe to Our Newsletter
View the Latest Virtual Edition

Categories

  • 50-Plus
  • Banking
  • Banking / Asset Managment
  • Building Trades
  • Business Briefs
  • Business News
  • Business Registrations
  • Business Reports
  • Commercial / Residential Real Estate
  • Community Services
  • Construction
  • Construction Planning
  • Corporate Tax / Business Planning
  • Cyber / Tech
  • Dining Guide
  • Economic Development
  • Economic Outlook 2016
  • Economic Outlook 2017
  • Economic Outlook 2018
  • Economic Outlook 2019
  • Economic Outlook 2020
  • Economic Outlook 2022
  • Education/ Training/ Personal Development
  • Entrepreneurial Women
  • Entrepreneurship
  • Environment / Development
  • Financial Planning / Investments
  • Fitness / Nutrition
  • Health / Community Services
  • Health & Fitness
  • Health & Wellness
  • Healthcare
  • Holiday Guide
  • Holiday Shopping
  • Home / Energy
  • Home / Insurance
  • Home & Real Esate
  • Insurance / Employee Benefits
  • Insurance / Medical Services
  • Legal / Accounting
  • Meet The Chef
  • New Businesses
  • Non-Profit
  • Office / Computer / New Media
  • Office / HR / Employment
  • Office/ Technology/ E-Commerce
  • Outlook 2021
  • Personnel Briefs
  • Retirement Planning
  • Senior Living / Retirement
  • Summer Construction
  • Uncategorized
  • Wellness
  • Women In Business
  • Workplace / Security / Legal
  • Year-End Tax Planning

Archives

  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
Connect With Us

Follow, like and subscribe to Saratoga.com on social media

Account Sign In Submit An Event
Saratoga.com logo
  • Home
  • Places To Stay
  • Things To Do
  • Food & Drink
  • Events
  • Real Estate
  • Businesses
  • Guides
  • Contact Us
  • Blogs
  • Sweepstakes
  • Advertising
Visit Saratoga.com For Everything Saratoga
Full-Service Internet Marketing: Search Engine Optimization, Website Design and Development by Mannix Marketing, Inc.
Mannix Marketing, Inc. is headquartered near Saratoga Springs in Glens Falls, New York
Saratoga.com All Rights Reserved © 2022
Disclaimer & Privacy Policy / Terms of Use / Copyright Policies

We strive to insure accuracy on Saratoga.com however accuracy cannot be guaranteed. Information is subject to change.
Please alert us if there is any inaccurate information here.

Having trouble using this site? Accessibility is our goal, please contact or email us with site improvements.