Connect Summer 2015 - Hudson Valley | Page 6

HACKERS COST THE U . S . ECONOMY UP TO 500,000 JOBS EACH YEAR Consider the damage caused when companies steal information from a competitor and eventually drive that competitor out of business .

Cyber Security Is

Everyone ’ s Priority

One of the biggest concerns surrounding the Internet of Things ( IoT ) is data security . More devices than ever are transmitting more data than ever , posing a significant threat to businesses tied in to the IoT .
In the past , an individual or department might be responsible for data security and cyber security within a company , but now the responsibility is shouldered at every level across an organization . Security directly affects many levels of business , from human resources practices to operational configurations and legal considerations .
Interconnected devices open the door for possible breaches in security . If one device is hacked , other devices may be at risk . A lost smart phone could connect to an individual ’ s personal data and information , as well as serve as a possible link to sensitive company data and information .
Three ways you can protect your company
It ’ s about the people
Is your tech , or your tech management practices , failing ?
> According to one data breach investigation , cyber security depends on people as much as it does on technology . Nearly 30 % of data breaches involved tactics like phishing that entice users to click on insecure emails . The same study shows that mid-level security measures , like implementing security patches that correct a potential vulnerability , could prevent more than three-quarters of low-difficulty data intrusions . Resolving management enforcement and accountability and being proactive about midlevel security measures may be just the fix for data safety and security .

1

Training and education . Make each employee aware of potential points where a breach can occur — theft , loss , neglect , and insecure practices . Provide education about the points of risk , such as phishing , spyware , and password protection .

2

Policy . The IoT represents many devices and moving parts communicating with each other . It ’ s crucial to have policies in place that ensure data safety without locking it down , as the exchange of information among technology and employees is what makes the IoT so powerful . Set guidelines for Bring Your Own Device , if necessary . Keep in mind , many industries require , regulate , and audit these standards .

3

Practice . Enforce best practices for cyber security across every department . Encourage personal responsibility — data safety requires all team members ’ participation . Enact a system for holding employees accountable , and create a plan for worst-case scenarios .
According to a Pew Internet and Society poll ,

91 % of Americans surveyed either agree or strongly agree that consumers have lost control of their personal information and data .

6 | SNB . COM // CONNECT TECHNOLOGY SUMMER 2015