{"id":20065,"date":"2016-10-13T17:01:10","date_gmt":"2016-10-13T21:01:10","guid":{"rendered":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity.html"},"modified":"2017-11-08T11:00:45","modified_gmt":"2017-11-08T16:00:45","slug":"business-report-5-misconceptions-about-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/","title":{"rendered":"Business Report: 5 Misconceptions About Cybersecurity"},"content":{"rendered":"
\n
\n\"michael\n<\/div>\n
\nMichael D. Billok is an attorney with Bond, Schoeneck & King.<\/p>\n

Courtesy Bond, Schoeneck & King PLLC\n<\/p><\/div>\n<\/div>\n

\nBy Michael D. Billok, Esq.\n<\/div>\n

As a business owner or operator, there are always a half-dozen items that require your immediate attention, and then the dozens of other items on the “back burner” that you would like to get to when there is time–but there never seems to be time available.<\/p>\n

Unless, of course, a back-burner item “blows up” and becomes a front-burner item, now requiring your immediate attention.<\/p>\n

For small and mid-sized businesses, cybersecurity routinely is one such back-burner item, not getting the attention it deserves unless something does “blow up,” for example there is a hack, a data breach or some release of employee or customer personal information that now requires immediate attention. This is due to several common misconceptions about cybersecurity, such as:<\/p>\n

\u00e2\u20ac\u00a2 I’m small. I won’t be hacked or compromised. False.<\/p>\n

Larger organizations have spent the past several years improving their cyber defenses to make it more difficult to access their data. As a result, hackers look to smaller organizations with less resources available to buttress their defenses as a jumping-off point to access larger organizations. Remember the national-news data breach at Target that occurred two years ago? Hackers didn’t directly “target” Target. They first hacked into an HVAC subcontractor’s network, and after compromising the subcontractor’s system they were then able to hack into Target utilizing the subcontractor’s access to Target’s network.<\/p>\n

\u00e2\u20ac\u00a2 I’m not a hospital or a bank, so there aren’t any cybersecurity laws that apply to me. False.
\nGranted, hospitals and banks have plenty of state and federal regulations–such as HIPAA and the Gramm-Leach-Bliley Act–to keep them occupied on the cybersecurity front. But all companies have a number of cybersecurity obligations of which they may not be aware. For example, companies have an obligation under the New York General Business Law to keep employees’ social security numbers secure.<\/p>\n

Beyond that, the Federal Trade Commission takes the position that all companies must take reasonable measures to safeguard customers’ personal and financial information–a company that does not do so will find itself defending against an unfair trade practice charge. And a company that issues “privacy notices” to consumers that does not actually adhere to its privacy notice can likewise find itself on the receiving end of a deceptive trade practice charge.<\/p>\n

Simply put, every employer has personal information of its employees, and personal (and possibly financial) information of its customers. As a result, every employer has cybersecurity obligations under the law.<\/p>\n

\u00e2\u20ac\u00a2 Most of these incidents are caused by skilled hackers. False.<\/p>\n

According to numerous surveys, including a recent one conducted by the Association of Corporate Counsel, the top cause of cybersecurity incidents and data breaches is not hackers–it’s employees. Your 100-employee company could have an attacker send a “phishing” email that looks legitimate, but has a link with embedded malware. And while you could have a 99 percent success rate of your employees deleting the email and not clicking the link, all it takes is a single employee clicking the link for your organization’s systems to be laid open to the world.<\/p>\n

There are numerous other scenarios in which employees play prominent roles in data breaches: losing laptops or cell phones with personal information; transmitting personal data over unsecure networks; or continuing to access the company’s information after they have departed, if their access rights are not shut off at separation. Employees are the company’s first line of defense, and thus a company’s largest cybersecurity vulnerability.<\/p>\n

\u00e2\u20ac\u00a2 If it’s going to happen, it’s going to happen. There’s not much I can do. False.<\/p>\n

While it is true that no system is impregnable, there is a difference between a house with its front door wide open, and a house with doors and windows barricaded and surrounded by a moat. There is no reason to leave the front door open for those who prowl the Internet for open access points, and there are many ways companies leave that front door open, such as not constantly updating firewall and antivirus software (or incredibly, not having it at all), or not tracking who can access their system to ensure that only authorized users have such access.<\/p>\n

There are simple, low-cost measures the company can institute that will close the front door, leaving a hacker to wander off to find some other network with an open front door.<\/p>\n

\u00e2\u20ac\u00a2 My insurance will cover it. False.<\/p>\n

The actual answer is “maybe.” Whether your insurance will cover cybersecurity incidents depends on your policy and the particulars of the incident, but would you like to know this fact before or after a data breach occurs?<\/p>\n

The reason that “cybersecurity policies” are skyrocketing in number is because many general policies do not cover cybersecurity incidents, or do not cover cybersecurity incidents caused by employee activity such as clicking on the link in the phishing email, or wiring the money to the account that the “CFO”–in reality a hacker with a spoofed email address of the company’s CFO–asked the employee to send.<\/p>\n

The threat, as they say, is real. Ignoring it, or relying upon probabilities or the law of averages is no longer an option for employers. This issue will move to the front burner sooner rather than later. Now go be safe in the cyberworld.<\/p>\n

Billok is an attorney with Bond, Schoeneck & King, who practices labor and employment law, as well as co-chairs the firm’s Cybersecurity and Data Privacy practice group.<\/p>\n","protected":false},"excerpt":{"rendered":"

Michael D. Billok is an attorney with Bond, Schoeneck & King. Courtesy Bond, Schoeneck & King PLLC By Michael D. Billok, Esq. As a business owner or operator, there are always a half-dozen items that require your immediate attention,…<\/p>\n","protected":false},"author":89,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"yoast_head":"\r\nBusiness Report: 5 Misconceptions About Cybersecurity - Glens Falls Business Journal<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Business Report: 5 Misconceptions About Cybersecurity - Glens Falls Business Journal\" \/>\r\n<meta property=\"og:description\" content=\"Michael D. Billok is an attorney with Bond, Schoeneck & King. Courtesy Bond, Schoeneck & King PLLC By Michael D. Billok, Esq. As a business owner or operator, there are always a half-dozen items that require your immediate attention,...\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Glens Falls Business Journal\" \/>\r\n<meta property=\"article:published_time\" content=\"2016-10-13T21:01:10+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2017-11-08T16:00:45+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-content\/uploads\/sites\/109\/2014\/08\/michael20billok.jpg\" \/>\r\n<meta name=\"author\" content=\"Jake Van Ness\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jake Van Ness\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/\",\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/\",\"name\":\"Business Report: 5 Misconceptions About Cybersecurity - Glens Falls Business Journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website\"},\"datePublished\":\"2016-10-13T21:01:10+00:00\",\"dateModified\":\"2017-11-08T16:00:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/a11ec438b5f0e57f1156754ba3931b86\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Report: 5 Misconceptions About Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website\",\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/\",\"name\":\"Glens Falls Business Journal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/a11ec438b5f0e57f1156754ba3931b86\",\"name\":\"Jake Van Ness\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8083519989e12032abdd06a668982ef4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8083519989e12032abdd06a668982ef4?s=96&d=mm&r=g\",\"caption\":\"Jake Van Ness\"},\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/author\/jakev\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Report: 5 Misconceptions About Cybersecurity - Glens Falls Business Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Business Report: 5 Misconceptions About Cybersecurity - Glens Falls Business Journal","og_description":"Michael D. Billok is an attorney with Bond, Schoeneck & King. Courtesy Bond, Schoeneck & King PLLC By Michael D. Billok, Esq. As a business owner or operator, there are always a half-dozen items that require your immediate attention,...","og_url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/","og_site_name":"Glens Falls Business Journal","article_published_time":"2016-10-13T21:01:10+00:00","article_modified_time":"2017-11-08T16:00:45+00:00","og_image":[{"url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-content\/uploads\/sites\/109\/2014\/08\/michael20billok.jpg"}],"author":"Jake Van Ness","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jake Van Ness","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/","url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/","name":"Business Report: 5 Misconceptions About Cybersecurity - Glens Falls Business Journal","isPartOf":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website"},"datePublished":"2016-10-13T21:01:10+00:00","dateModified":"2017-11-08T16:00:45+00:00","author":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/a11ec438b5f0e57f1156754ba3931b86"},"breadcrumb":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2016\/10\/business-report-5-misconceptions-about-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/"},{"@type":"ListItem","position":2,"name":"Business Report: 5 Misconceptions About Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website","url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/","name":"Glens Falls Business Journal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/a11ec438b5f0e57f1156754ba3931b86","name":"Jake Van Ness","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8083519989e12032abdd06a668982ef4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8083519989e12032abdd06a668982ef4?s=96&d=mm&r=g","caption":"Jake Van Ness"},"url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/author\/jakev\/"}]}},"_links":{"self":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/20065"}],"collection":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/comments?post=20065"}],"version-history":[{"count":1,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/20065\/revisions"}],"predecessor-version":[{"id":29240,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/20065\/revisions\/29240"}],"wp:attachment":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/media?parent=20065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/categories?post=20065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/tags?post=20065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}