{"id":15532,"date":"2014-08-13T14:31:47","date_gmt":"2014-08-13T18:31:47","guid":{"rendered":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge.html"},"modified":"2014-08-13T14:31:47","modified_gmt":"2014-08-13T18:31:47","slug":"security-an-organizational-challenge","status":"publish","type":"post","link":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/","title":{"rendered":"Business Report: Security: An Organizational Challenge"},"content":{"rendered":"
\n
\n\"jared\n<\/div>\n
Jared Humiston, president, Adirondack Technical Solutions in Argyle\n<\/div>\n<\/div>\n

By Jared Humiston<\/p>\n

Maintaining a secure business is no
\nsmall task. With so much demand on everyone’s
\ntime it becomes easy to overlook the
\nsmall details that protect your business.<\/p>\n

This task should never fall on one person’s
\nshoulders but rather on the organization
\nas a whole. Here are some helpful tips to
\nkeep your organization secure.<\/p>\n

It is widely believed that anti-virus,
\na firewall, complex passwords and some
\nweb content filtering software will keep
\nyou safe and secure. While these are all
\ncritical components of keeping data secure,
\nthese are only part of the equation
\nthat is security. Law enforcement experts
\nestimate that 50 percent of breaches result
\nfrom employees misusing access privileges,
\nwhether maliciously or unwittingly.
\nYou have to be conscientious about both
\ninternal and external threats. Users with
\nelevated privileges can accidentally delete
\ndata that causes harm to the organization.
\nThese acts do not have to be intentional
\nto be harmful. Periodically review who
\nhas access to what information. We come
\nacross a lot of situations where all company
\ndata is put into one folder and shared
\nout. This gives users access to files that
\nshould remain confidential.<\/p>\n

Another area of security that is often
\nover looked is training the “human firewall.”
\nMost spyware is the direct result
\nof user behavior. This could be using
\nFacebook, checking personal e-mails,
\ninstant messaging programs and other
\nuser\/employee provided devices. Have a
\npolicy, plan and\/or solution in place to
\naddress these areas is necessary in any
\nsized organization.<\/p>\n

Educating and training your employees
\non the dangers of these behaviors can help
\nthe user identify a potential threat before
\nclicking. A way that an employee can commonly
\nbe socially engineered is outlined in
\nthe following example: If a person comes
\nin for an interview and they ask the front
\ndesk person to take this USB stick and
\nprint out the file called resume real quick
\nbecause they were running late because
\ntheir kid was sick.<\/p>\n

Your employee wants to help, so they
\nplug it in, pull up the resume and print
\nit out and hand it to the interviewee and
\nthey are delighted. The person goes into
\nthe interview and comes out says thanks
\nand that’s that. What the employee did
\nnot know is that the USB stick contained
\nmalicious code that will log all of their
\nkeystrokes and send them to the attacker.
\nIt will gather passwords and could even
\nprovide a backdoor into the network. If
\na policy was in place to never accept a
\ndevise from non-employees or had a device
\ncontrol application been in place, this
\ncould have been prevented. The employee
\nis as vulnerable as the desktop or laptop.<\/p>\n

You see security is a layered approach
\nand it is different for every organization.
\nNot to beat analogies to death in this article
\nbut this analogy describes security
\nin laymen’s terms. When you go to bed at
\nnight, you would never leave your front
\ndoor wide open and lock just your bedroom.
\nThis would allow the would be attackers\\
\nhackers free access to your house. Normally,
\nyou lock the all the doors and may
\neven have a bolt to provide extra security.
\nClosing these doors provides another barrier
\nfor them to have to break down to gain
\naccess. Hearing the racket will prompt you
\nto call police. They now have to break down
\na secondary bed room door.<\/p>\n

Having two doors should provide time
\nfor the police to show up and thwart off
\nthe attacker or eliminate the threat all
\ntogether. If you are running out of time,
\nyou have a secondary escape route out the
\nwindow. Without these secondary measures
\nin place, something much worse could
\nhave happened. The same applies in your
\nbusiness environment. You want to have a
\nplan of action on how to prevent attackers
\nfrom gaining access to your network and be
\nprepared for if they do and how to properly
\nrespond to eliminate the damage to your
\nfiles and reputation.<\/p>\n

Security does not come prepackaged,
\nit is tailored to each and every network
\nenvironment, large or small. It includes
\nevery member of the organization to ensure
\nthat your business is safe. Firewalls are
\ngood until someone initiates a download.
\nWeb content filtering is good except for
\nwhen a policy is forgotten to be applied.<\/p>\n

This is why you scratch your head at night
\nwondering why one of your users was down
\nhalf the day because of a virus when you
\npaid for anti-virus and a firewall.<\/p>\n

Humiston is president of Adirondack
\nTechnical Solutions in Argyle.<\/em><\/p>\n

Photo Courtesy Adirondack Technical Solutions<\/p>\n","protected":false},"excerpt":{"rendered":"

Jared Humiston, president, Adirondack Technical Solutions in Argyle By Jared Humiston Maintaining a secure business is no small task. With so much demand on everyone’s time it becomes easy to overlook the small details that protect your business. This…<\/p>\n","protected":false},"author":88,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[67],"yoast_head":"\r\nBusiness Report: Security: An Organizational Challenge - Glens Falls Business Journal<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Business Report: Security: An Organizational Challenge - Glens Falls Business Journal\" \/>\r\n<meta property=\"og:description\" content=\"Jared Humiston, president, Adirondack Technical Solutions in Argyle By Jared Humiston Maintaining a secure business is no small task. With so much demand on everyone's time it becomes easy to overlook the small details that protect your business. This...\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Glens Falls Business Journal\" \/>\r\n<meta property=\"article:published_time\" content=\"2014-08-13T18:31:47+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-content\/uploads\/sites\/109\/2014\/08\/jared20humiston20.jpg\" \/>\r\n<meta name=\"author\" content=\"Amanda Delyser\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amanda Delyser\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/\",\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/\",\"name\":\"Business Report: Security: An Organizational Challenge - Glens Falls Business Journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website\"},\"datePublished\":\"2014-08-13T18:31:47+00:00\",\"dateModified\":\"2014-08-13T18:31:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Report: Security: An Organizational Challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website\",\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/\",\"name\":\"Glens Falls Business Journal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5\",\"name\":\"Amanda Delyser\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g\",\"caption\":\"Amanda Delyser\"},\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/author\/amandadelyser\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Report: Security: An Organizational Challenge - Glens Falls Business Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/","og_locale":"en_US","og_type":"article","og_title":"Business Report: Security: An Organizational Challenge - Glens Falls Business Journal","og_description":"Jared Humiston, president, Adirondack Technical Solutions in Argyle By Jared Humiston Maintaining a secure business is no small task. With so much demand on everyone's time it becomes easy to overlook the small details that protect your business. This...","og_url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/","og_site_name":"Glens Falls Business Journal","article_published_time":"2014-08-13T18:31:47+00:00","og_image":[{"url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-content\/uploads\/sites\/109\/2014\/08\/jared20humiston20.jpg"}],"author":"Amanda Delyser","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amanda Delyser","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/","url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/","name":"Business Report: Security: An Organizational Challenge - Glens Falls Business Journal","isPartOf":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website"},"datePublished":"2014-08-13T18:31:47+00:00","dateModified":"2014-08-13T18:31:47+00:00","author":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5"},"breadcrumb":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/08\/security-an-organizational-challenge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/"},{"@type":"ListItem","position":2,"name":"Business Report: Security: An Organizational Challenge"}]},{"@type":"WebSite","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website","url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/","name":"Glens Falls Business Journal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5","name":"Amanda Delyser","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g","caption":"Amanda Delyser"},"url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/author\/amandadelyser\/"}]}},"_links":{"self":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/15532"}],"collection":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/users\/88"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/comments?post=15532"}],"version-history":[{"count":0,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/15532\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/media?parent=15532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/categories?post=15532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/tags?post=15532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}