Alloy Silverstein holds symposium on cyber security
Page 4 • Wednesday, December 12, 2018 • The Hammonton Gazette
TREE, from Page 1
Reynold Cicalese iii, who talked
about the new security compli-
ance standards from the American
institute of Certified Public Ac-
countants (AiCPA), as well as the
lessons learned from the 2017
equifax data breach that 2017 the
sensitive personal information of
143 million people.
Cicalese iii stressed the impor-
tance of taking a proactive ap-
proach to cyber security and
making sure there are multiple
protective measures in place to
protect one’s personal information
and prevent another security
breach from happening.
“We recommend you look at
your credit reports at least once a
year. You should definitely con-
sider looking into the cyber secu-
rity and how you’re doing that,
how that’s performing, getting
some sort of engagement done on
that. But it’s very important that
you don’t just do nothing; you
have to do something,” Cicalese
iii said.
Cicalese iii was succeeded by
Mary Anne Schafer, president and
founder of SMi Network and
Cloud experts, whose presenta-
tion observed the significant ef-
fects the current new technology
era (also known as “the digital
transformation”) has had on the
way businesses operate and com-
municate.
However, while technological
advances like cloud connectivity
services and virtual private net-
works (VPNs) have allowed for
the rise of many new information
resources, Schafer said they have
also created more threats for
cyber-attacks on businesses and
their employees.
“Our threat for attack has been
increased so dramatically because
the doors that open in our business
every day for new information re-
sources that we’re connecting to
only give us more and more expo-
sure that we have to be sensitive
to … We really have to make sure
that our secured information is au-
thenticated, that we don’t want
unreliable resources getting into
our infrastructure,” Schafer said.
Scott Kinka, founding partner
and chief technical/product devel-
opment officer of cloud strategy
company evolve iP, gave a pres-
entation about business continuity
and the importance of business
mobility.
Kinka said implementing a mo-
bile-first strategy for business
processes and technology is the
best way to avoid loss of data,
business disruption and costly
downtime.
“No matter what happens to my
headquarters, i want my people
working. i think everyone in this
room can say that … Companies
that lose their data have a signifi-
cantly higher propensity to go
bankrupt, to have business disrup-
tion,” Kinka said.
Attorney Denise L. Sanders,
shareholder of the Health Care
and Privacy & Security Groups at
Capehart Scatchard Attorneys at
Law, provided the audience with
ideas about how they can limit
their legal risk should a data
breach affect them. Sanders said
privacy is pivotal when it comes
to cybersecurity, and fortunately,
there are many state and federal
laws in place to uphold privacy in
the event of a data breach.
“Understand that there are mul-
tiple laws that apply to you, and
they’re just expanding exponen-
tially every day. i can tell you
there are 50 bills in the New Jer-
sey Legislature regarding privacy,
security and data breach right
now,” Sanders said.
Another method of preventing
the negative consequences of a
THG/Stephen Pistone. To purchase photos in The Gazette, call (609) 704-1940.
Alloy Silverstein recently held a cyber security symposium in Mount Laurel.
cyber-attack is to explore cyber about as much cyber insurance as
risk insurance policies, which we did alien abduction insurance
were discussed by panelist Joe … They didn’t understand why
Haggerty, director of client serv- they needed it; that has drastically
ices for Hardenbergh insurance changed. The vast majority of our
commercial lines of insurance—
Group.
Haggerty said cyber risk poli- our middle market, our large com-
cies have become much more mercial insurance—they all
common over the past 15 years, purchased this coverage. it has
and now is the ideal time to get never been more affordable, and
covered.
we’ve never had broader cover-
“Ten, 15 years ago, we sold ages available,” Haggerty said.
if someone’s personal informa-
tion and data is compromised in a
cyber-attack, a sinister conse-
quence that could arise if that in-
formation ends up on the dark
web for malicious purposes. This
network forms a small part of
the deep web—the part of the in-
ternet that is not indexed by search
engines.
According to Harry Srolovitz,
branch manager of Atlantic, To-
morrow’s Office, sensitive per-
sonal information is ending up on
the dark at an disturbing level,
which is costing people significant
sums of money.
“it’s rampant: data is being
leaked, spilled, stolen at an alarm-
ing rate and it’s increasing every
year. And the cost of that is astro-
nomical … We’re talking over a
half billion records of informa-
tion, just recently,” Srolovitz said
during his presentation about the
deep web and dark web.