{"id":15811,"date":"2014-10-15T15:00:03","date_gmt":"2014-10-15T19:00:03","guid":{"rendered":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple.html"},"modified":"2014-10-15T15:00:03","modified_gmt":"2014-10-15T19:00:03","slug":"it-experts-vital-security-issues-are-not-always-simple","status":"publish","type":"post","link":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/","title":{"rendered":"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed"},"content":{"rendered":"

Computer system security lapses periodically
\nmake headlines, causing serious
\nproblems for those whose systems have been
\nviolated. It should make all businesses take
\nnotice.
\nBut local IT experts say that while the
\nramifications can be severe, steps can be
\ntaken to see it doesn’t happen.<\/p>\n

Alex T. Silverstein, president of Unified
\nDigital Group LLC in Ballston Spa, noted
\nthat “every business that retains electronic
\nrecords of any kind should consider whether
\nor not portions of those records need to be
\nencrypted.”<\/p>\n

“We hear about the hacking and theft of
\ncredit cards every night on the news,” said
\nMark Shaw, founder and president of Stored
\nTechnology Services (StoredTech). “For the
\nsmall business owners like us, there are a
\nnumber of lessons to learn from these events.”
\nHe stressed that an upcoming issue involving
\nMicrosoft servers needs to be addressed soon.<\/p>\n

Jared Humiston, president of Adirondack
\nTechnical Solutions, said security needs to
\nbe thought of in layers and businesses should
\nconsider that approach.<\/p>\n

Each expert provided the Saratoga Business
\nJournal with some advice.<\/p>\n

\"techHumiston, Layering Security<\/strong>:
\nAs a solutions oriented company with a
\nfocus on security, we have seen cyber crime
\nreach an all-time high in recent years. In
\nmany cases, small business owners that do
\nnot work with a security
\nfocused IT firm
\nfind out how vulnerable
\ntheir data is when it is
\ntoo late.<\/p>\n

The damage done
\nfrom a cyber-attack
\ncould prove catastrophic
\nfor a business.
\nWe have seen the
\nnegative results of cyber-attacks on some
\nof the larger companies. These companies
\nhave taken losses in the tens of millions of
\ndollars and have lost the public’s confidence,
\nfurther increasing the damage done to their
\norganization.<\/p>\n

Security needs to be thought of in layers.
\nA simple password that you change every 90
\ndays is not enough. Those layers should go beyond
\nthe out of the box virus protection and
\nfirewalls. Companies also need to consider
\nhow their employees are using their technology
\nin and out of the office and include social
\nengineering into their security policy.<\/p>\n

These policies should be reviewed and updated
\non an annual basis to ensure they are
\ncurrent. Security should be an organizational
\neffort with the sole goal of improving the
\ncompany’s security posture and protecting
\ntheir data and their client’s data.<\/p>\n

Technology is ever changing and your
\norganization should be prepared for change.
\nCloud computing, electronic purchasing and
\nmillions of mobile devices have increased the
\nnumber of targets for cyber criminals. It is
\nrecommended that companies with high-risk
\ndata or that may fall in a regulated industry,
\nhave annual risk assessments and vulnerability
\nassessments completed to make sure
\nthe improvements made to your environment
\nthroughout the year have not opened up new
\nholes in which you can be exploited.<\/p>\n

We encourage these businesses to contact
\ntheir local IT Service provider for the proper
\nguidance in implementing a security program
\nin their organization.<\/p>\n

\"alex-silversteinSilverstein on Encryption<\/strong>:
\nA company can incur significant financial
\nand legal penalties if any personal, financial,
\nor other sensitive information is exposed to
\nunauthorized parties.<\/p>\n

In lay person’s terms, encryption is
\nthe process by which
\nclear text, that is, data
\nstored in its original,
\nunmodified state, is
\nrendered unreadable
\nby humans and, more
\nimportantly, un-hackable
\n(in most cases) by
\nsophisticated computer programs designed to
\nsteal that information.<\/p>\n

Encryption is performed by running
\nspecialized, mathematical programming
\nalgorithms that manipulate your clear text,
\nresulting in protected cypher text. If you are
\nnot a programmer or database administrator,
\nyou will most likely need to hire one to
\naccomplish this task for you.<\/p>\n

Most strong forms of encryption usually
\nwork by way of a pair of digital keys, known
\nas a public and private key. Your public key
\nis used to encrypt your data. You can share
\nthis key with anyone who needs to create
\nencrypted data for you. Your public key cannot
\nbe used to decrypt (that is, to un-encrypt)
\nyour data. Only the private key can be used
\nto perform decryption; therefore, you should
\nnever share it with any unauthorized parties.<\/p>\n

If your institution is in the habit of storing
\nsensitive information in clear text in a
\ndatabase, spreadsheet, or other electronic
\nformat, it is up to you, as a principal of the
\ncompany, to take action as soon as possible.
\nThe cost of hiring a professional to perform
\ndata encryption is surprisingly low (since it
\nis a common task), the reduction of risk is
\nimmediate, and your return on investment
\nexceedingly high.<\/p>\n

\"mark_shaw.jpg\"Shaw on Secure Servers<\/strong>:
\nWhile it’s pretty clear that these attacks
\nwere coordinated against targets like large
\ncorporations there are takeaways for all
\nof us. What is the largest item for security
\ncoming up for many businesses? There is an
\neasy answer.<\/p>\n

Microsoft is focusing
\non security for its
\nServer 2003 operating
\nsystem. This is going
\nend-of-life July 14,
\n2015, which means
\nthat servers in many
\nenvironments will
\nneed to be replaced
\nand migrated to a newer
\nversion. Microsoft
\nwill no longer provide updates or fix security
\nflaws exposed after that date. In essence the
\nservers are sitting ducks.<\/p>\n

While Windows XP dying made a splash this
\nyear, this issue is even larger. Servers are the
\nbackbone of many networks and if they are not
\nupgraded, everything from files, applications
\nand more could be compromised and used by
\nthose looking to breach a company’s security.<\/p>\n

The single largest event for many businesses
\nis this end-of-life for the core of their
\nnetworks. Upgrading or replacing a server
\noperating system requires more than just
\nbuying a new version and installing it. There
\nare a number of things to consider:<\/p>\n

Can your hardware handle the upgrade? If
\nyou have a server that is five-plus years old,
\ndoes it have the horsepower to run the new
\noperating system? Server 2003 would run with
\nmuch lower requirements then the new 2012
\nR2 editions.<\/p>\n

Is your server under warranty? Older servers
\nwill be out of coverage and it becomes a business
\ndecision to continue to utilize hardware
\nthat cannot easily be repaired.<\/p>\n

Will all your applications work on the new
\noperating system? Often applications like
\nQuickbooks need to be upgraded to the latest
\nversion. If this is not planned for it can cause
\na slowdown in the upgrade path and increase
\nunexpected costs.<\/p>\n

What other functions does that server provide?
\nDoes it run the company’s printers? Does
\nit allow users to connect remotely? Does it run
\nthe email services for the company? Defining
\nthese items and addressing how they will work
\nmoving forward is fundamental to a successful
\ninstall of a new server and operating system.<\/p>\n

Upgrading an operating system on your
\nhome computer is far less intensive than the
\nupgrade of an operating system on a server.
\nLooking at these issues can make the process
\na lot less painful.<\/p>\n

This is just one of many things that will
\nhelp ensure that a company is protected, other
\nitems like proper virus protection, firewalls,
\nVPN’s, policies, mobile device management,
\nweb security, and more will make the environment
\nless prone to vulnerabilities. Discussing
\nWindows Server 2003 going end of life, should
\nbe on every company’s road map for 2015, and
\nthe time to plan for that is now.<\/p>\n","protected":false},"excerpt":{"rendered":"

Computer system security lapses periodically make headlines, causing serious problems for those whose systems have been violated. It should make all businesses take notice. But local IT experts say that while the ramifications can be severe, steps can be…<\/p>\n","protected":false},"author":88,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43],"tags":[66],"yoast_head":"\r\nIT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed - Glens Falls Business Journal<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed - Glens Falls Business Journal\" \/>\r\n<meta property=\"og:description\" content=\"Computer system security lapses periodically make headlines, causing serious problems for those whose systems have been violated. It should make all businesses take notice. But local IT experts say that while the ramifications can be severe, steps can be...\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Glens Falls Business Journal\" \/>\r\n<meta property=\"article:published_time\" content=\"2014-10-15T19:00:03+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-content\/uploads\/sites\/109\/2014\/10\/tech20story20-2020jared20humiston.jpg\" \/>\r\n<meta name=\"author\" content=\"Amanda Delyser\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amanda Delyser\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/\",\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/\",\"name\":\"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed - Glens Falls Business Journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website\"},\"datePublished\":\"2014-10-15T19:00:03+00:00\",\"dateModified\":\"2014-10-15T19:00:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website\",\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/\",\"name\":\"Glens Falls Business Journal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5\",\"name\":\"Amanda Delyser\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g\",\"caption\":\"Amanda Delyser\"},\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/author\/amandadelyser\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed - Glens Falls Business Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/","og_locale":"en_US","og_type":"article","og_title":"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed - Glens Falls Business Journal","og_description":"Computer system security lapses periodically make headlines, causing serious problems for those whose systems have been violated. It should make all businesses take notice. But local IT experts say that while the ramifications can be severe, steps can be...","og_url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/","og_site_name":"Glens Falls Business Journal","article_published_time":"2014-10-15T19:00:03+00:00","og_image":[{"url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-content\/uploads\/sites\/109\/2014\/10\/tech20story20-2020jared20humiston.jpg"}],"author":"Amanda Delyser","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amanda Delyser","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/","url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/","name":"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed - Glens Falls Business Journal","isPartOf":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website"},"datePublished":"2014-10-15T19:00:03+00:00","dateModified":"2014-10-15T19:00:03+00:00","author":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5"},"breadcrumb":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2014\/10\/it-experts-vital-security-issues-are-not-always-simple\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/"},{"@type":"ListItem","position":2,"name":"IT Experts: Vital Security Issues Are Not Always Simple, But Need To Be Addressed"}]},{"@type":"WebSite","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website","url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/","name":"Glens Falls Business Journal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5","name":"Amanda Delyser","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g","caption":"Amanda Delyser"},"url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/author\/amandadelyser\/"}]}},"_links":{"self":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/15811"}],"collection":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/users\/88"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/comments?post=15811"}],"version-history":[{"count":0,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/15811\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/media?parent=15811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/categories?post=15811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/tags?post=15811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}