Page 122

extra step is sometimes the harder step to understand the threats and extra things to do to protect yourself, and look to trusted institutions with relationships to get assistance. Be bold, ask and when there is some assistance take it.” Answering another query to the panel, Ms. Fowler alluded, “from a business standpoint, they need to be cognizant of what they bring into their environment. It is really critical to understand what assets you have inside - people, technology, the facilities themselves – it is a prioritization process.” Mr. Levin added another array of things to target optimizing for business: 2 factor identification; training; segmenting data as need to use and need to know; mapping data to be readied for incidents; aggressive vulnerability analysis and patch programs, and more. He forewarned we “have to assume there is going to be an incident. A defining moment can be how a breach is handled. In the future, regulators, class action attorneys and the public will judge businesses on how well they protected the data and how well did they respond for customers, employees and business partners.” Indeed. within the last few years, there are several products in the market that will offer cyber protection for individuals stated Mr. Thielen. “There are policies that cover financial fraud, extortion and ransomware, privacy breaches, cyberbullying and other disruption victimization. Incident response coaches will have steps of what to do and facilitate,” noting they should be contacted in the first steps. Adding layers of redundancy to make a security culture was also stressed by Mr. Keen. “Victimized business owners may face obligations from rules and regulations to notify customers or partners that could lead to loss of revenue, so it makes a lot of sense to

mitigate risk through policies. Cyberthreats are evolving constantly, the latest stat is 250,000+ strands of malware are created daily, so if you are not evolving at an equal pace you are continuing to be left at risk. The reason why there is so much cybercrime is because it is easy and because it pays.” Mr Levin underscored that “the truth is technology makes us powerful, but it also makes us vulnerable. When convenience trumps security, there are issues. And we know as technology evolves, the protection tends to catch up and there are responses to the flaws and issues, the bad guys find a work-around, because there is more money on the dark side, and so we need to work together and find new ways to do this and find ways to better accurately authenticate people. Especially for businesses, we have to move toward privacy by design and security by design, and can't be a bolt on - they have to be a core of things from day one. IOT devices should not be allowed to be connected to the internet until a new password is entered to work, so devices can be updated and upgraded automatically.” “As businesses, the threat is evolving everyday,” concurred Ms. Fowler, “but we are really worried about the impact, be it from a cyberattack or a natural disaster, so it is very important for businesses to think about what is it that is most important for the operations of this business, and then make sure they have the right protections around those things most critical and more broadly than cyber - being resilient to accomplish its most important objectives. For personal, we look at kids and monitoring what is online and think about what is most important and build protections around that.”

Profile for Athleisure Mag

Athleisure Mag Oct 2018  

New