Published October 14, 2022 – William Prohn was among the cybersecurity industry leaders invited by Buffalo Business First to discuss ways organizations can keep their systems well-protected and mitigate risk.
A computer network without data-protection measures becomes an irresistible target for cybercriminals. The risk spreads exponentially beyond an individual organization as systems connect globally and use cloud services.
There is much to consider when safeguarding an organization’s digital information. Increasingly clever cybercriminals have been able to break through conventional cybersecurity solutions such as antivirus software and firewalls.
Cybersecurity industry leaders were invited by Buffalo Business First recently to discuss ways organizations can keep their systems well-protected and mitigate risk.
- David Cialone, director of information technology and chief information security officer, Synergy IT Solutions.
- Jessica Copeland, chair of cybersecurity and data privacy, Bond Schoeneck & King PLLC.
- William Prohn, managing director, Dopkins & Co. LLP.
- Christine Wiktor, vice president and insurance placement specialist, M&T Insurance Agency.
The term cybersecurity can strike fear into the hearts of those in charge of keeping computer systems safe. Though it may seem complicated and overwhelming, there are basic measures organizations and companies can make to remove some risks, Prohn said.
The federal Cybersecurity and Infrastructure Security Agency is marking October, Cybersecurity Awareness Month, Prohn said, by promoting these four simple steps:
- Use multifactor authentication that involves passwords, fingerprints, and a second device, such as a phone or additional email. Use more than one of these to enhance security. Multifactor authentication is especially important for remote workers connecting into the company system.
- Use strong passwords that are easy to remember but difficult for others, and use a different password for every site, every product, every application.
- Learn to recognize and report phishing because that is the source of most threats. The more scouts there are looking and reporting these attempts, the more likely they can be eradicated.
- Update and patch all software and systems. Most of these will offer advanced security features.
Read Bill’s companion article, Cybersecurity: Where to start?