Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.
Lockheed Martin to pay Q3 dividend of $2.40 a share
Lockheed Martin Corp. (NYSE: LMT) announced on June 25 that its board of directors has authorized a third-quarter 2020 dividend of $2.40 per share. The dividend is payable on Sept. 25, to holders of record as of the close of business on Sept. 1. It’s the same amount that Lockheed paid in each of the […]
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Lockheed Martin Corp. (NYSE: LMT) announced on June 25 that its board of directors has authorized a third-quarter 2020 dividend of $2.40 per share.
The dividend is payable on Sept. 25, to holders of record as of the close of business on Sept. 1.
It’s the same amount that Lockheed paid in each of the last three quarters. At Lockheed’s current stock price, the dividend yields more than 2.6 percent on an annual basis.
Lockheed Martin (NYSE: LMT) — a Bethesda, Maryland–based defense contractor — has two plants in Central New York, in Salina and in Owego — as part of the firm’s rotary and mission systems (RMS) business area. The plants employ 4,100 people combined.
The company has about 110,000 workers worldwide.
OCC plans for in-person and remote instruction for the upcoming fall semester
ONONDAGA — The fall semester at Onondaga Community College (OCC) will involve a mix of in-person and remote instruction. Faculty, students, and employees will all be required to wear masks on campus when classes begin Aug. 31. It is part of the plan that the OCC announced June 25. All on-campus instruction will conclude prior
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ONONDAGA — The fall semester at Onondaga Community College (OCC) will involve a mix of in-person and remote instruction.
Faculty, students, and employees will all be required to wear masks on campus when classes begin Aug. 31. It is part of the plan that the OCC announced June 25.
All on-campus instruction will conclude prior to the Thanksgiving break, OCC said, and any activity following Thanksgiving until the end of the semester “will be done remotely” so students do not have to travel and then return to campus.
“Anything that would happen between Thanksgiving and the technical end of the semester would be remote,” OCC President Casey Crabill tells CNYBJ. “Students might have a paper to finish or … attend a Zoom session,” she said.
Classes
Some classes will involve a combination of in-person and remote instruction.
For example, a class with 18 students which meets three days a week may have six students attend in-person Monday, a different six students in the classroom Wednesday, and another six students in-person Friday.
Students not in physical attendance will interact with the class and their professor virtually and in real-time. If a student becomes ill, he or she will be able to keep up with classes and coursework from a distance, OCC said.
Some classes will be conducted entirely remotely — either in real-time or in traditional online formats where students participate on their own schedule.
OCC says it measured all learning spaces to determine “maximum allowable density.”
The school will also stagger schedules for labs which require in-person, hands-on learning for density purposes, allowing all students the chance to receive in-person instruction time from faculty “as they normally would.”
Residence halls
All residence-hall bedrooms will be singles (no doubles or triples), meaning one student per room. Students living in suite-style units will continue to share common spaces in those suites in small, “family-style” groups.
One of the college’s residence halls will remain empty and reserved for quarantine purposes, “if necessary,” OCC said.
Students will move into residence halls during a staggered, four-day period in mid-August. Students will undergo a health screening upon arrival.
All classroom, residence-hall, and campus common areas will be cleaned and disinfected on a daily basis.
Health screenings
Two of the campus’s three entrances will be open and everyone who comes to campus will undergo a brief health screening “every day.”
Students living in residence halls will also be screened daily. Since campus reopened as part of phase two, everyone entering campus has been screened daily, OCC noted. Screenings will continue “as long as recommended by New York State,” it added.
CNY Hackathon helps students prepare for work in cybersecurity
UTICA–ROME — The CNY Hackathon, a regional intercollegiate cybersecurity competition, is typically held twice a year at local institutions and has been a collaborative effort between Mohawk Valley Community College (MVCC), Utica College, and SUNY Polytechnic Institute (SUNY Poly). The spring CNY Hackathon event held April 17 and 18 went to a virtual format amid
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
UTICA–ROME — The CNY Hackathon, a regional intercollegiate cybersecurity competition, is typically held twice a year at local institutions and has been a collaborative effort between Mohawk Valley Community College (MVCC), Utica College, and SUNY Polytechnic Institute (SUNY Poly).
The spring CNY Hackathon event held April 17 and 18 went to a virtual format amid the coronavirus pandemic.
The CNY Hackathon brings college students together from all throughout the region, “encouraging continuous learning,” and connecting students with local industry partners, per a news release about the spring event.
“There are number of attacks that happen to computers and our industry professionals know what those attacks are because they are dealing with them every day in defending computers from attacks all the time. And what they do is they simulate those actual real-world attacks for our students and expect our students to be able to defend against them,” says Jake Mihevc, dean for the School of Science, Technology, Engineering and Mathematics (STEM) at MVCC and CNY Hackathon co-founder. He spoke with CNYBJ on June 30.
The event was started as a partnership between MVCC, SUNY Poly (called the SUNY Institute of Technology at the time), and Utica College, according to Mihevc.
Over the last seven years, the CNY Hackathon has become a major event in the Mohawk Valley, aiming to improve computer science and cybersecurity education while more closely aligning academia with local industry partners.
Event purpose
When the CNY Hackathon started in 2013, a group of faculty members, students, some industry partners, and some captains from the Air Force Research Lab all came together and recognized that cybersecurity is a “very applied field” and students … “need to be able to hit the ground running as soon as they enter the field,” says Mihevc.
The Hackathon was an attempt to give students a “bridge” between the academic world and the workforce for cybersecurity. It puts them in “real-life scenarios” where they’re defending virtual operating systems from simulated attacks from the red team. The red team is made up of local industry professionals from many of the different consulting and cybersecurity industry partners throughout the Utica–Rome area.
“They create virtual operating systems that have flaws in them and students need to race to lock down those flaws before the red team goes in and takes them down,” says Mihevc.
Event sponsors were able to meet with students online and provide guidance, advice and information on how to submit résumés and apply for positions. The support of industry partners allowed the CNY Hackathon community to stay together for the spring event in an online venue.
The event sponsors include: Griffiss Institute, Air Force STEM, Adeptus Cyber Solutions of Rome, Assured Information Security (AIS) of Rome, Quanterion Solutions Incorporated of Utica, National Grid (NYSE: NGG), PAR Government of Rome, NYCM Insurance, North Point Defense of Rome, and Leet Cyber Security of Albany.
AIS has been a long-time supporter of the event, not only as a sponsor, but by providing volunteers to challenge the participants, per the news release. AIS employees volunteer for the event, as many of them learned about AIS through participating in the CNY Hackathon, the firm said.
For example, Brodie Davis is a software engineer whose path to AIS started while in college at SUNY Polytechnic Institute.
He participated in the CNY Hackathon while in school and was approached by two AIS employees at the event about pursuing an internship. He began as an intern at AIS the following summer and was hired full-time before he graduated college.
Davis is still actively involved with community events like the CNY Hackathon, and now represents AIS every year.
“Interacting with the local cyber community taught me the skills I needed to be successful,” said Davis. “It was through this hackathon that I was able to apply my knowledge and advance my skillset into a career.”
Mihevc says the students who participated in the spring virtual event handled it very well, but he admitted the “in-person element” of interactions with students and industry professional was missing. It is something they hope to recapture during the fall event during the first weekend in November.
“We [who] run the event have been working toward running the event virtually over the last few years. We receive funding from the National Security Agency that has helped us further develop the event. We’re very likely to be running the CNY Hackathon in the future in a nationwide capacity for the National Security Agency,” says Mihevc.
About hacking
Hacking is not a “derogatory term,” according to Mihevc.
“When we talk about the bad actors, we refer to them as malicious hackers,” he adds.
The other terms that industry professional use are white-hat and black-hat hackers. White-hat hackers are the good guys and black-hat hackers are the bad guys, he noted.
Mihevc called hacking “very general term,” and defines it as learning how to adapt a program beyond its original scope.
“How to take something that was built to do something one way and people that have hacking skills can take that and make it do something slightly different than it was designed to do and something that maybe people aren’t expecting,” he says.
Malicious hackers, he says, understand how software and hardware work and they go in and exploit the weaknesses. At the same time, hackers with good intentions will see a piece of software that isn’t working as well as it possibly could and they adapt it in a way that “makes it more secure,” says Mihevc.
Georgia tech firm acquires iV4
The information-technology firm iV4, which is based in Rochester and has an office in Syracuse, has a new owner. ProArch — headquartered in Marietta, Georgia — acquired iV4 in May, per a news release on the iV4 website. ProArch is a global cloud consulting and product-engineering company. The two businesses say they “complement each other.”
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The information-technology firm iV4, which is based in Rochester and has an office in Syracuse, has a new owner.
ProArch — headquartered in Marietta, Georgia — acquired iV4 in May, per a news release on the iV4 website. ProArch is a global cloud consulting and product-engineering company.
The two businesses say they “complement each other.” ProArch focuses on product engineering, data, and cloud services, while iV4 specializes in managed services, networking, cloud architecture, and cybersecurity.
With the sale, iV4 became iV4, a ProArch company.
The acquisition deal resulted in some leadership changes at the combined company. Santosh Kaveti, ProArch’s current CEO, will continue in that position. Michael Spoont, iV4’s CEO, will serve as president of ProArch as well as president and CEO of iV4, a ProArch company.
“This big step is about growth and the next generation of iV4,” Spoont said in the release. “By joining together, iV4 and ProArch will form a powerful force in cloud consulting, cybersecurity, data science and product engineering. The blending of capabilities will complement one another and allow us to compete on a higher, more scalable level moving forward. We will now have a comprehensive solution stack service offering fully enabled to design, execute, and support cloud-first, data-driven business transformation for our clients. While this is a big change for our organization, there will be new individual opportunities for everyone to also grow.”
Besides its headquarters near Atlanta, ProArch has offices in the United Kingdom, India, and Singapore. It has 215 employees and more than 200 clients around the globe.
The acquisition followed ProArch’s 2019 search for a firm to “complement its business strengths, address current gaps and establish a greater U.S. presence.”
“Joining forces with iV4, for us, is all about growth and opportunities,” Kaveti said. “ProArch and iV4 together have a thriving story in the making in the areas of cloud, data, artificial intelligence, product engineering, and security.”
Spoont noted that iV4 started as a small company headquartered in Syracuse with a half-dozen people.
“The 2011 merger with Integrity Networks System took us to the next level. We’ve experienced double-digit growth over the past several years and we’re continuing that journey of growth and evolution now with ProArch,” said Spoont.
How I Would Hack You: Confessions of an Ethical Hacker
“How I would hack you…” is a compelling opening statement to say the least. The global business community has experienced an economy left supported by our web technologies in the midst of a global pandemic, social concerns, and conflict in recent months. Prior to that, even, it would be a challenge to identify a single competitive
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
“How I would hack you…” is a compelling opening statement to say the least. The global business community has experienced an economy left supported by our web technologies in the midst of a global pandemic, social concerns, and conflict in recent months. Prior to that, even, it would be a challenge to identify a single competitive organization that does not rely on web technologies, networks, and applications to support their finances, data, services, and more.
“How I would hack you,” is a chilling statement for any supervisor, manager, or executive to hear — albeit one which should inarguably pique the interest and spark a level of intrigue of any business owner, executive, or manager.
What do you imagine a hacker really is? Does it invoke images of a dark, wet basement isolated in an old warehouse filled with green glowing computer screens and empty bottles of Mountain Dew? Do you think of a hooded figure tapping frantically at his laptop battle-station, actively gathering your passwords, usernames, and credit-card numbers? The reality might surprise you, and you may find it is a bit different than the action-movie persona you have seen.
In a recent webinar titled “How I Would Hack You: Confessions of an Ethical Hacker,” James Carroll, information security engineer at Secure Network Technologies, Inc., gives us a look under the hood of how it’s done by the pros. Carrol has served in his role at Secure Network Technologies for more than 10 years, protecting the data of clients ranging from NFL teams to small credit unions. He starts with an introduction on how he got into hacking by taking down other players’ networks in video games to give him the win and automatically level-up his account at breakneck speeds (a practice now discouraged by him since “denial-of-service” attacks are now considered a felony). Carroll then follows up with his presentation format, which covers: “Current Events; 2 Types of Hacks; How These Hacks Happen; The Anatomy of a Hack – 4 Phases of pwnage; Open-Source Intelligence Gathering; Gaining Network Access; Gaining Admin Access; and Where Does This Data Go?”
Cybersecurity concerns have become magnified during the coronavirus pandemic. As a result, COVID-19 phishing and SPAM-mailing is “absolutely skyrocketing” according to Carroll. Hackers are opportunistic people and are taking full advantage of the new density of offsite work — and the security vulnerabilities that come with it. He demonstrates current hacking trends that use “phishing” emails to elicit passwords and malicious-link clicks by unaware users.
Breaking this down further, Carroll describes that there are two typical types of hacks — “social engineering” and “people hacking.” Social engineering leverages what he calls “the obvious”:
• Phishing — Fake emails made to look like real ones in order to get users to click a link, share info, or download something they otherwise wouldn’t.
• Pretexting — Impersonating someone at your organization.
• Baiting — Leaving something like a thumb drive loaded with malware in parking lots outside congested areas like a workplace where someone might pick it up and stick it into their computer, infecting the whole network.
• Vhishing — “Voice Phishing”, where someone pretends to be an official source such as a government organization, bank, or even your own company.
• Physically Breaking Into Buildings — The good old-fashioned “smash and grab”.
He goes on to describe people hacking as the tendency of hackers to look for the weakest link in your organization’s teams and conventions to find a vulnerability. As an example, Carroll shows a video of a physical intrusion test performed by Secure Network Technologies where he was able to gain access to a corporate building simply by “tailgating.” Carroll, in fully forged corporate uniform wearing an “official” duplicated ID badge, was able to gain access just by following an actual employee who scanned their ID to open the door first. The employee took one glance at Carroll, saw the ID badge, and felt comfortable enough to hold the door open for him. He walked in without a hitch, carrying a box of USB flash drives loaded with test-malware to leave on the break-room table. This is one example of how a real hacker with malicious intent would gain access.
James recommends that employees should not be afraid to ask, “Who are you? Who are you with? Who are you here to see? What are you here for?” to unfamiliar entrants at the door of your organization. Additionally, he says it is a good practice to make everyone entering the building scan their own ID — describing instances where recently-terminated employees have come back in to steal data and compromise something within the business.
So how would James Carrol hack you? The same way an unethical hacker would. He calls this “The Anatomy of a Hack” and it consists of the following four phases:
1) Open Source Intelligence Gathering (OSINT for short). Successful criminals do their homework first. Open-source intelligence is used In the criminal sense to ascertain relationships, contact information, work info and ultimately – when and how you’re most vulnerable. It’s gathered from all the information you publish about your life via social media and more.
2) Gain Network Access. Gaining access to a network will allow a malicious actor to identify devices, servers, and users within your organization, further developing the identification of targets.
3) Gain User Access. Once hackers have identified a user and a system, they work to gain user access on a host system through using their open-source intelligence or other hacking techniques such as phishing, vishing, and pretexting.
4) Gain Admin. Access. Ultimately, gaining user access is the precursor to gaining administrator access — which is commonly attached to a user. Admin access will allow the hacker to install malicious software that can infect the entire network, in addition to gaining access to admin-restricted data and systems.
The goal of all this, in no uncertain terms, is to remain undetected. Just as malicious actors want to remain undetected while successfully stealing your valuable data, this remains an anchor for Secure Network Technologies’ own testing goals — to hack your organization in much the same fashion as a criminal might (without all the damage and fallout that comes with actually getting hacked), and then provide detailed results so your organization and its information-technology personnel know how to fix it (this is the part the bad guys hate). Some immediate recommendations Carrol makes for your organization is to exceed “best practices” for passwords, enable two-factor authentication for every app possible, and to stop putting your entire life on social media where hackers look first for sensitive personal information.
For any fellow nerds and aspiring ethical hackers out there, James shares some technical tools of the trade — software with fittingly cryptic names such as MetaZploit, Empire, Burp, Responder and SilentTrinity, among others. You can check out Secure Network Technologies at www.securenetworkinc.com/cnybj.
Rob Dracker is CEO and creative director of WMC (Weapons of Mass Creation). Contact him at rob@wmcstudios.com or (315) 935-7982. This article is originally sourced from a GoToWebinar run by Ted Hulsy, CEO of Iron Path, on June 4, 2020 featuring James Carroll, of Secure Network Technologies.
Ithaca firm wins $12M software contract from Air Force
ITHACA — GrammaTech Inc. has been awarded a $12.2 million cost-plus-fixed-fee completion contract from the U.S. Air Force to provide Artemis Framework prototype software. This contract provides for research, design, development, demonstration, test, integration and delivery of the Artemis Framework, according to a June 26 U.S. Department of Defense contract announcement. The pact will enable
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ITHACA — GrammaTech Inc. has been awarded a $12.2 million cost-plus-fixed-fee completion contract from the U.S. Air Force to provide Artemis Framework prototype software.
This contract provides for research, design, development, demonstration, test, integration and delivery of the Artemis Framework, according to a June 26 U.S. Department of Defense contract announcement. The pact will enable rapid adaptation of software to changes in requirements, platforms, and computational resources “at a scale and speed appropriate for the complex software ecosystem.”
Work will be performed in Ithaca and is expected to be completed by June 26, 2024. The Defense Department said 20 companies bid for this contract. Nearly $751,000 in fiscal 2019 research, development, test, and evaluation funds are being obligated at the time of award. The Air Force Research Laboratory in Rome is the contracting agency.
GrammaTech says it is a developer of software-assurance tools and advanced cybersecurity solutions. The firm says it helps customers solve the “most challenging software issues of today and tomorrow, safeguarding embedded mission-critical devices from failure and cyberattack.”
The firm’s regional headquarters is in Ithaca and its corporate headquarters is in Bethesda, Maryland.
Other clients of GrammaTech include NASA, the FDA, Daimler, Panasonic, Philips, and Siemens.
Katko backs bills for a national cyber director, advisory committee
A proposal in the U.S. House of Representatives would create the position of national cyber director within the White House. U.S. Representative John Katko (R–Camillus) is among the lawmakers who have introduced the National Cyber Director Act. Katko also previously unveiled a bill that would establish a cybersecurity advisory committee, which now has a companion
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
A proposal in the U.S. House of Representatives would create the position of national cyber director within the White House.
U.S. Representative John Katko (R–Camillus) is among the lawmakers who have introduced the National Cyber Director Act. Katko also previously unveiled a bill that would establish a cybersecurity advisory committee, which now has a companion bill in the U.S. Senate.
National cyber director
The director would serve as the U.S. president’s principal advisor on cybersecurity and “associated emerging technology issues,” and function as the lead national-level coordinator for cyber strategy and policy, Katko’s office said in a news release.
Katko is a ranking member on the cybersecurity, infrastructure protection & innovation subcommittee. He introduced the measure with four other House lawmakers.
The national cyber director would develop and oversee implementation of a national cyber strategy, direct and coordinate federal agency cyber activities, collaborate with private-sector entities, and participate in meetings of the National Security Council and Homeland Security Council.
The president would appoint the position, which would be subject to U.S. Senate confirmation. The individual would lead an office within the Executive Office of the President.
“At the national level, we need a coordinated approach to cybersecurity that ensures individuals, businesses, schools, hospitals, and governments are protected against cyberattacks,” Katko said. “For this reason, I introduced the National Cyber Director Act, bipartisan legislation that would establish the national cyber director position within the White House. This position would be filled by a dedicated cyber expert who would lead a cohesive national cyber strategy that protects our country against cyberthreats. This is a significant step forward for improving our national security.”
The creation of a national cyber director was a “key recommendation” in the cyberspace solarium commission’s inaugural report this year.
The cyberspace solarium commission is a Congressionally-chartered commission tasked with developing and recommending a national strategy for improving American cybersecurity.
The commission reiterated this recommendation in a recently published pandemic white paper which outlined measures to protect against cyberthreats during the COVID-19 pandemic.
Cybersecurity advisory committee
Katko is also applauding U.S. Senators David Perdue (R–Ga.) and Kyrsten Sinema (D–Ariz.) for introduction in the Senate of companion legislation to Katko’s Cybersecurity Advisory Committee Authorization Act.
With “bipartisan support” in both chambers of Congress, Katko on June 23 called for immediate consideration of this measure.
Introduced last year by Katko, the bipartisan Cybersecurity Advisory Committee Authorization Act would establish an advisory committee at the Cybersecurity and Infrastructure Security Agency (CISA) to coordinate and improve U.S. cyber efforts. Made up of cybersecurity professionals from every major business sector, as well as state and local-government officials, the committee will consult with, report to, and make recommendations to the director of CISA.
In March, Katko’s Cybersecurity Advisory Committee Authorization Act was also recommended in the cyberspace solarium commission’s report. The measure was one of two Katko-authored measures included in the commission’s final report.
“I am pleased to see Sens. Perdue and Sinema introduce the Cybersecurity Advisory Committee Authorization Act, in the Senate,” Katko said. “Throughout the past few years, and especially during the COVID-19 pandemic, we have seen an uptick in cyberattacks that have compromised personal data, proprietary information, and in many cases crippled operations for businesses and governments. This bill aims to better secure our nation and protect against evolving cyberthreats by creating a public-private committee at [CISA].”
Schumer bill would boost funding for science research, including cybersecurity
SYRACUSE — U.S. Senate Minority Leader Charles Schumer (D–N.Y.) has introduced a bill called Endless Frontier Act that he says seeks to “solidify U.S. leadership in scientific and technological innovation” through increased investments in the discovery, creation, and commercialization of critical technology fields, such as cybersecurity. It would also establish new regional technology hubs. The
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE — U.S. Senate Minority Leader Charles Schumer (D–N.Y.) has introduced a bill called Endless Frontier Act that he says seeks to “solidify U.S. leadership in scientific and technological innovation” through increased investments in the discovery, creation, and commercialization of critical technology fields, such as cybersecurity.
It would also establish new regional technology hubs.
The Democrat introduced the legislation along with U.S. Senator Todd Young (R–Ind.), U.S. Representative Rohit Khanna (D–Calif.), and U.S. Representative Michael Gallagher (R–Wisc.).
Schumer explained that the Endless Frontier Act is a “necessary investment” into research, education and training, technology transfer and entrepreneurship, manufacturing, and the broader U.S. “innovation ecosystem” across the nation.
The lawmaker says that the Endless Frontier Act proposes an expansion of the National Science Foundation (NSF) — to be renamed the National Science and Technology Foundation (NTSF) — and the establishment of a Technology Directorate within NTSF to advance technology in 10 critical focus areas.
The newly-established Technology Directorate would receive $100 billion over five years to lead investment and research in artificial intelligence and machine learning; high-performance computing; robotics, automation, and advanced manufacturing; quantum computing; cybersecurity; biotechnology; and semiconductors, Schumer said.
An additional $10 billion would be authorized to designate at least 10 regional technology hubs, awarding funds for comprehensive investment initiatives that position regions across the country to be global centers for the research, development, and manufacturing of key technologies.
“From becoming one of the nation’s first interconnected ‘smart cities’ to investments in the regional STEAM School and a ‘Drone Zone’ at the Tech Garden, Syracuse and Onondaga County are planting seeds to be a major growth hub in the future economy. Along with partners in the private sector and world-class institutions like Syracuse University, Central New York is uniquely positioned to take advantage of any federal investment to establish regional technology hubs as the Endless Frontiers Act aims to do,” Schumer said in a release. STEAM is short for science, technology, engineering, arts, and mathematics.
“As we emerge from the economic challenges of COVID-19, cities need to focus on long term economic resilience, not just short-term recovery,” Syracuse Mayor Ben Walsh added in the release. “The Endless Frontier Act rightfully recognizes that our country needs more regional hubs for technology innovation to remain competitive globally. Cities like Syracuse and our surrounding region, with leading research universities and a history of investment in emerging technologies, are primed to become the nation’s next technology hubs with additional leadership and support from the federal government.”
A number of New York–based technological organizations and companies have already expressed “strong support” for the Endless Frontier Act, per Schumer’s office. They include Binghamton University; CenterState CEO; Clarkson University; Cornell University; Corning Incorporated; Launch NY; M&T Bank; Rochester Institute of Technology; SUNY Polytechnic Institute; and Syracuse University.
Are businesses prepared for the return-to-work security risks?
As lockdowns eases, many businesses are preparing for employees to return to work. But are their corporate networks ready, with adequate security measures in place, to ensure their systems are protected from the increased risk of a cyberattack owing to staff and their equipment working from home? Cyber criminals are well aware of employee environments and
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
As lockdowns eases, many businesses are preparing for employees to return to work. But are their corporate networks ready, with adequate security measures in place, to ensure their systems are protected from the increased risk of a cyberattack owing to staff and their equipment working from home?
Cyber criminals are well aware of employee environments and will target cyberattacks in areas that have become vulnerable. We saw this with the spike of phishing attacks themed around working from home and it will continue to evolve as workforces change their work practice once again.
When remote working descended upon the nation strong and fast earlier this year, some organizations were able to issue company standard devices with regularly patched antivirus security. However, for the majority, there was a frenzy to equip their staff with the required machines to enable a quick and adequate “working from home” set up. As we now raise our heads above the parapet, we are seeing an abundance of employee hardware lacking necessary security and about to connect to their company’s corporate network, risking sensitive data being exposed to a cyberattack.
Computers used for remote working are likely to have confidential company data stored, have been shared with family members possibly visiting insecure websites or installing insecure software for example, with no guarantee that they have been patched and maintained over these recent months. The big question is: can these external devices be trusted back on to the corporate network?
Businesses need carry our risk assessments and put best practices in place before their networks are exposed. First, staff need to share where company data has been saved and under which accounts, work, or private credentials. Was it a public cloud environment like Google Drive, OneDrive, or Dropbox? This all needs to be disclosed to minimize risk, ensure data is safe, and compliance with government laws is maintained.
Secondly, if employees have been sharing the devices with their house members, have they given away their password? Is the password the same across work accounts and personal accounts? What new software has been installed or removed and by whom? Were there any security warnings such as viruses being detected by anti-virus software? Has any confidential paperwork been printed at home and has it been shredded or dropped in the bin? Where employees have access to sensitive information, questions need to be answered before they rejoin an organization’s network.
If a company allows all machines back onto their corporate network, they will need to rely on network monitoring and most critically, they will need to monitor the activities of the people within the network. It is the people who pose the greatest business risk if they have not received ongoing support in terms of cybersecurity awareness training. They are operating from within a company’s network on a daily basis, sending and receiving data through a multitude of access points. If left untrained, employees are a hackers’ haven, an easy access point to the entire network, surpassing any technological measures in place to keep them out. If trained, employees are your greatest line of defense — your human firewall.
Stephen Burke is CEO & founder of Cyber Risk Aware, a global firm offering real-time cybersecurity awareness training and enterprise risk and compliance reporting.
Cybersecurity Protections Are Essential, Now More Than Ever
“Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there is a key hidden somewhere, they won’t stop until they find it.” — Tim Cook The COVID-19 pandemic has disrupted many standard policies and procedures for tax-exempt management employees who are working remotely. The pandemic disruption has increased internal-control risks
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
“Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there is a key hidden somewhere, they won’t stop until they find it.” — Tim Cook
The COVID-19 pandemic has disrupted many standard policies and procedures for tax-exempt management employees who are working remotely. The pandemic disruption has increased internal-control risks for many organizations. Every organization must have increased focus on the inherent vulnerabilities of technology and related software applications.
After hearing that global criminal enterprises have been focusing on tax-exempt organizations for purposes of accomplishing technology breaches, I asked John Roman from our FoxPointe Solutions information technology division to provide me with his “Top 10” recommendations for mitigating the risk associated with cybersecurity breaches. His response to me was a revelation for me as a technology dinosaur.
“We’re too small to be targeted.” “We have cyber insurance.” “We can’t afford cybersecurity.” Do these phrases sound familiar? These are often the reasons that nonprofit organizations give for their lack of sufficient cybersecurity. Unfortunately, we live in a world where hackers look for vulnerabilities, human and technical. Hackers continually scan the Internet for technical vulnerabilities using automated tools. Hackers take advantage of humans during bad situations, and today, there are many: COVID-19, a recession, civil unrest, and the 2020 elections. Hackers do not discriminate. They will target small and large businesses, educational institutions, government agencies, and not-for-profits alike.
Today, data has become as valuable as gold or oil. Nonprofits, large and small, collect vast amounts of private data of those they serve and of their donors. This is exactly what hackers want. They want to exploit your organization’s vulnerabilities, whether it be through email phishing or a phone call pretending to be your bank. The goal: steal and/or encrypt all of your data unless you pay their ransom.
What is a not-for-profit to do, especially during these times of reduced budgets, donations, and government funding? If you’re feeling overwhelmed or don’t know where to start, consider these no cost or low-cost cybersecurity best practices.
1. Patch all computer systems every 30 days with critical Windows security patches. On a monthly basis, ensure that all of your Windows computer systems are patched. For smaller nonprofits, turn automatic updates on and do not allow users to opt out of the updates. For larger organizations, ensure that your IT department is applying patches on PCs and servers.
2. Enable anti-malware/virus and firewalls on all PCs. Ensure that every computer has active, working, and up-to-date protection. Enable Windows firewalls on all computers, especially laptops.
3. Encrypt data at rest and in motion. Any portable device (laptop, USB drive, tablet, or phone) should have encryption enabled. Since these devices are portable, and easily lost or stolen, you will minimize the need to report a data breach should a device that contains personal information get lost or stolen if said device is encrypted.
4. Strengthen passwords. Make sure your passwords are long and complex. Try using a passphrase that is at least 12 characters long (spaces count) to easily remember your password and ensure that it is “uncrackable”. As an example, “I love my dog spot!” will take over 64,000 years to crack. As a bonus, unless your password is leaked, you will only need to change it once per year.
5. Train your employees on cybersecurity. You and your employees are the firewall. Your best line of defense is you and the employees of your organization. Ensure that you are providing your workers with annual security awareness training. Make it relatable to them and their personal experiences. Look into training programs from LinkedIn Learning and KnowB4. Frequently send emails on the latest and greatest in terms of new threats and ways to avoid them.
6. Comply with the New York SHIELD Act. The “Stop Hacks and Improve Electronic Data Security Act” was enacted on July 25, 2019 as an amendment to the New York State Information Security Breach and Notification Act. The law went into effect on March 21, 2020. The motivation behind the SHIELD Act is to update New York’s data-breach notification law to keep pace with current technology. Every organization that creates, processes, stores, or transmits New York State resident private information must comply. To comply, an organization must have completed a risk assessment, assigned an information-security officer, and created a written information security plan along with accompanying series of administrative (policies), physical, and technical controls.
7. Perform frequent data backups and restores. One of the only ways to recover from a ransomware attack or from someone inadvertently deleting data from a server or PC is to have an up-to-date backup. In the example of a ransomware attack, rather than paying the ransom, which is a bad idea in more cases than not, the data that has been encrypted by the ransomware can be restored from your organization’s backup. Backups must be run daily and tested frequently to ensure that data being backed up is available for restore.
8. Plan for a disaster. It’s not a matter of if you have a disaster (data breach, power failure, pandemic, or your email is down for two hours), it’s when. Those who do not have a documented disaster-recovery plan along with corresponding procedures for recovering systems and data will spend twice the time and money trying to restore systems and data than those who have a plan. Along with your data-backup plan, create a disaster-recovery plan. Remember, “practice makes perfect”. Make sure you are testing your plan annually. Your test could be as simple as choosing one system to simulate being unavailable for a period of time and practicing how long it takes to recover from the failure.
9. Practice good computer hygiene. Do you get your car’s oil changed every 3,000 to 5,000 miles? How about an annual physical? Of course, we all practice good hygiene. So, why not do so from a computing perspective? For example, close, disable, or delete all accounts for those who are no longer employed by the organization. Have a data-retention policy and practice it. There is no reason why you need to keep a document created and last accessed in 1998 unless there is a business or regulatory reason to keep it.
10. Move to the cloud. Cloud providers such as Microsoft, Amazon, and the like have more security controls in place than your nonprofit can afford. Your data is probably more secure in the cloud than it is on your servers. Services such as Office365 are relatively inexpensive for nonprofits, especially those that have subscribed to Tech Soup (https://www.techsoup.org/). Cloud solutions offer anytime, anywhere, any device access to applications and data. During this pandemic, those who use cloud services were able to transition their employees to working from home more easily than those who did not use cloud computing.
The suggestions above are certainly not an all-inclusive best practice list. However, for most nonprofits, these are a good start for or continuation of your cybersecurity efforts. There are numerous cybersecurity providers who can assist. If possible, the provider should have a good understanding of not-for-profits and the intricacies of how they operate. Finally, remember, cybersecurity starts with you. It takes a combination of people, policy, and technology to form a strong cybersecurity foundation.
After discussing the above with John, I was prompted to provide you with inspirational quotes that I found very appropriate, including:
“There is no silver bullet solution with cybersecurity — a layered defense is the only viable defense.” — James Scott
“Passwords are like underwear: you don’t let people see it, it changes very often, and you shouldn’t share it with strangers.” — Chris Pirillo
Please stay safe and healthy.
Gerald J. Archibald, CPA, is a partner in charge of the management advisory services at The Bonadio Group. Contact him at (585) 381-1000, or via email at garchibald@bonadio.com
Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.