trinus corporate newsletter 1 march 2015 special printer version
TRANSCRIPT
TECH NEWS
Cyber At tack
Trends for 2015
Where is the Weakest Link?
It is the end user, the naive
employee as opposed to the better
protected network server
administrators. Zeroing-in on the
employee’s workstation has turned
out to be much easier than
expected. Once the hacker’s foot is
in the door, the next step of
targeting deeper into your network
is much less a challenge. You see,
employees today want to be
technically savvy. Many of them
bring their own device (BYOD). This
can range anywhere from a laptop,
to a tablet, to a smart phone, to
something as seemingly benign as a
USB thumb drive. All of which are
removed from the worksite on a
daily or weekly basis and exposed
to who knows what in the
employees home.
So don’t bother wasting your time
worrying about locking your office
doors at night. Your employees
have a key and the code to your
alarm. They are making copies and
sharing with everyone obliviously.
EDUCATION BYTE
How is Your IT Backside?
Most businesses truly believe that they are
well protected from unauthorized cyber
invaders. When asked, the average
executive shrugs his/her shoulders and
replies, “…Our own IT guys have it under
control”. In reality, Alberta business report
160 network breaches per year. So how
many other unauthorized penetrations go
unreported? Considering the Privacy
Commissioner will be breathing down your
neck if personal customer information hits
the web, it may be time to take a closer
look at how you cover your “ass-ets”.
Besides the threat of being sued for
millions of dollars, the loss of customer
credibility and the sheer inconvenience of
repairing the damage from private
information loss, being IT security
complacent increases risk. Nevertheless, it
is unlikely you can do without technology.
You need access to the internet and you
use computers for proprietary business
intelligence. Therefore, you have entered
the cyber arena whether you like it or not.
Are you ready for the fight, or will your
systems be sliced apart by the byte-
gladiators?
If you’re plugged into a router / modem
which then connects to the World Wide
Web (www) you can expect to encounter
up to 90 million security events per year.
Consider this the same as someone rattling
the front door of your business 246,000
times per night. Eventually, if you don’t re-
enforce your perimeter protection the door
will open.
Traditionally business moguls and
government agency conglomerates have
been the focus of technology exploiters.
Penetrating their networks with high
volumes of confusion, destruction and
armored pathogens has successfully caused
havoc. But the chance of their
apprehension is increasing, so these same
international experts have dug further
underground. Yet their passion to be
recognized as the best systems disruptor
remains.
The strategy of the hacker this year will be
to attack the weakest link in the IT
network chain.
March 2015 Corporate Newsletter Issue 1
Bug Out!
Privacy screens not only help
protect the information on your
screen, they also help protect the
screen itself by adding a layer of
physical defense from scratches
and grime.
Contact Us a t info@tr inustech.com
TRINUS FACT
Did you know we select
our experts carefully?
Our Director of the IT Security
Department has been a law
enforcement professional for 35
years. Bradley Siddell was a sworn
member of three separate police
agencies, the RCMP, the Edmonton
Police Service, and most recently
as the Deputy Commissioner with
the Royal Montserrat Police
Service in the Caribbean. I know,
it’s a tough life but someone has to
fight crime and/or evil in the
tropics?
Today Bradley tackles IT Security
threats and consults on safety and
security stewardship worldwide.
Offering a variety of case and
records management best
practices, Bradley will partner with
your agency to ensure you comply
with all mandatory security
requirements.
Scheduled Training
Education is a critical element in
the fight against unintentional loss
of private information and network
attacks. Whether it is your
employee group or managers and
executives, the affordable
awareness training provided by our
IT Security Team will ensure you
are on the right track.
Section 34 of the Alberta Personal Information Protection Act (PIPA) states:
IT SECURITY – It’s the Law!
“…An organization must protect personal information that is in its custody or under its
control by making reasonable security arrangements against such risks as unauthorized
access, collection, use, disclosure, copying, modification, disposal or destruction...”
What are these mandatory security safeguards? We know!
WARNING: THIS MIGHT FRIGHTEN YOU
ARE YOU?
compliant
with Federal
and Provincial laws
related to
IT Security and
Information Privacy?
F i n d O u t H o w t o R e c e i v e t h i s “ S e a l ”