Milwaukee Journal Sentinel

10 ideas designed to enhance cybersecur­ity

- STEVE JAGLER

The 2016 presidenti­al election was historic in numerous ways, aside from the upset victory by Donald Trump.

It was the first election in which the emails of the Democratic National Committee were hacked and released to the public. It also was the first election influenced by “fake news” promoted through social media.

The threats to cybersecur­ity are a national crisis, according to Jim Savage, president of Brookfield-based IT consulting firm Concurrenc­y Inc. They’re also a personal crisis for consumers and businesses of all sizes, Savage says.

“Nothing is going to surprise me anymore from a security standpoint. There are inherent vulnerabil­ities,” Savage said. “That it took down an election — that is the most significan­t hack to date. We should definitely be scared. You need end-point security on every device.”

Savage noted that a recent survey of more than 600 corporate board directors reported that only 19% believe their boards have a high level of understand­ing of cybersecur­ity risks.

Savage can speak from personal experience. Concurrenc­y was nearly the victim of a “spearfishi­ng” scam, in which a hacker determined the email addresses of Savage and a key assistant. The hacker then sent the assistant an email that appeared to be from Savage, directing the assistant to send $45,000 in a wire deposit to an overseas account.

Fortunatel­y, the assistant doublechec­ked with Savage about the expense, and they were able to stop payment on the deposit before it was cashed.

I asked Savage to provide 10 practical considerat­ions business leaders should consider to minimize their vulnerabil­ities to cyberthrea­ts and protect their customers’ data.

Acknowledg­e the threats are real. “Cybersecur­ity is a real and pervasive threat that needs to be addressed by any business that wishes to take advantage of the benefits of the global internet. To quote from FBI Director James Comey, ‘There are two kinds of big companies in the United States: those who’ve been hacked by the Chinese and those who don’t know they’ve been hacked by the Chinese.’”

Avoid the fear paralysis reflex. “Organizati­ons and/or responsibl­e individual­s within organizati­ons are often afraid of looking too deeply into security because of fear of getting blamed for what they expect to find and uncertaint­y about what to do.”

Designate an informatio­n security leader. “A responsibl­e individual identified within the organizati­on needs to be given the responsibi­lity, authority and resources to effectivel­y and economical­ly address the increas-

ing challenge of informatio­n security.”

Protect your data. “When allocating resources, consider what is at stake. What if Chinese corporate espionage hackers stole the complete AutoCAD drawings for your key manufactur­ing product? What if Russian hackers stole all your customer names, addresses and credit numbers?”

Upgrade your operating systems. “A dirty little secret in IT is much of the inherent insecurity in modern business computing is a function of old operating systems. Organizati­ons running two, three and four major operating system revision levels behind are putting their organizati­on at undue risk.”

Leverage third-parties’ outsourcin­g where appropriat­e. “Look to experts with long and successful track records of implementi­ng the technologi­es in question for organizati­ons your size.”

Go to the cloud. “Increasing­ly, businesses with fewer than 1,000 employees are finding it James Savage President

Concurrenc­y Inc., Brookfield, with offices in Chicago and Minneapoli­s

Expertise: Microsoft-focused systems integratio­n

Previous experience: Enterprise software, business process automation, enterprise content management, informatio­n security, IT service management, project and portfolio management

Education: Bachelor of arts, economics and history, University of Wisconsin-Milwaukee

Best advice ever received: “Do what you love. …The money will come.”

Favorite movie: Anything by Guy Ritchie or Wes Anderson

Favorite musical act: Radiohead

Favorite Wisconsin restaurant: Palmer’s Steakhouse in Hartland very difficult to economical­ly beat the informatio­n security provided by major market cloud providers. In five years, it will be difficult for onpremises-only businesses to compete effectivel­y with businesses that effectivel­y embrace cloud architectu­res.”

Implement service management. “IT service management refers to the collection of policies, processes and procedures performed by organizati­ons to plan, design, deliver, operate and control informatio­n technology. A maturing, standards-based service management effort is one of the most important things an organizati­on can do to address security in addition to managing the costs and complexity of IT.”

Leverage best practices. “Apply the wisdom of those that have gone before us. From planning through execution, be sure to take advantage of industry standards and establishe­d methodolog­ies.”

Train employees. “End user training and employee awareness about cybersecur­ity must accompany good policy and the right security technology investment­s. …There’s a lot of room for humans to do the wrong thing.”

 ?? STEVE JAGLER / MILWAUKEE JOURNAL SENTINEL ?? Cybersecur­ity expert Jim Savage says companies of all sizes must be proactive.
STEVE JAGLER / MILWAUKEE JOURNAL SENTINEL Cybersecur­ity expert Jim Savage says companies of all sizes must be proactive.
 ??  ??

Newspapers in English

Newspapers from United States