On Thursday, October 4th, William Prohn, Dopkins System Consultants Managing Director, served as a panelist at the Business First of Buffalo annual Executive Forum on Cyber Security. In a follow-up article, Bill provides best practices regarding daily activities that can effectively reduce risks from technology use and protect valuable business information.
Dotting the “I”s and Crossing the “T”s
Cyber security is generally defined as protecting against the risks posed by the use of the Internet: the global interaction of computer networks and anonymous users, characterized by hackers, breaches and ransomware. However, the risks are often closer to home, as are the most effective protections: in the “IT” or information technology systems and controls used every day in every business. While it is crucial for every business to have an Incident Response Plan in place to guide its activities when a breach or hack inevitably happens, and to regularly assess IT risks in a formal Risk Assessment exercise so that security efforts will be directed where they do the most good, there are any number of smaller daily activities that can effectively reduce risks from technology use and protect valuable information. Taking the time to “dot the I’s and cross the T’s” of information technology is something every business can and should do immediately to improve its cyber security posture.