Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.

Syracuse basketball schedules Oakland for Dec. 6 non-conference game
SYRACUSE, N.Y. — The Syracuse University men’s basketball team will host Oakland University in a non-conference game on Dec. 6 at the newly renamed JMA

Binghamton University using $3.5M NSF grant for cybersecurity scholarships
VESTAL, N.Y. — A federal grant of $3.5 million over the next five years will help Binghamton University offer cybersecurity scholarships to two dozen students. The National Science Foundation’s (NSF) CyberCorps Scholarship for Service (SFS) program is designed to recruit and train the next generation of information-technology (IT) experts and security managers to meet the
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
VESTAL, N.Y. — A federal grant of $3.5 million over the next five years will help Binghamton University offer cybersecurity scholarships to two dozen students.
The National Science Foundation’s (NSF) CyberCorps Scholarship for Service (SFS) program is designed to recruit and train the next generation of information-technology (IT) experts and security managers to meet the needs of federal, state, local, and tribal governments.
In return for their scholarships, recipients agree to work after graduation in government cybersecurity positions for a period equal to the length of their scholarships, Binghamton University said.
Faculty members from the departments of computer science and electrical and computer engineering at the Thomas J. Watson College of Engineering and Applied Science will oversee Binghamton’s SFS program. If it is deemed a success, the NSF could award further funding.
The school cited CyberSeek, a tech job-tracking database, as indicating about 465,000 open positions in cybersecurity were available nationwide in 2021. The SFS program seeks to help fill the gap, “with a special emphasis on attracting people of diverse backgrounds to the profession.”
Binghamton University President Harvey Stenger sees the CyberCorps program as one that takes advantage of several of the campus’ core strengths.
“We know there’s a huge need in this field for highly trained experts,” he said. “Binghamton has a longstanding commitment to first-generation students and scholars from underrepresented minorities. We also have a robust set of course offerings and scholarship related to cybersecurity. It’s exciting to know that Binghamton will play a part in diversifying this essential workforce.”
Securing the NSF grant
In 2020, the National Security Agency and the Department of Homeland Security named Binghamton a National Center of Academic Excellence in Cyber Research (CAE-R) through 2025. The designation recognizes the work at the Center for Information Assurance and Cybersecurity (CIAC), which is led by Ping Yang, a computer science associate professor.
Watson College Dean Krishnaswami (Hari) Srihari acknowledged the faculty and staff who collaborated to seek the NSF funding, “which is granted to fewer than 100 schools nationwide.” Srihari believes it will increase the visibility of Binghamton’s cybersecurity efforts in the academic community and the U.S. government.
“Our researchers and students are building the future by tackling our 21st-century problems head-on,” Srihari said. “Ensuring that our data remain safe is a key part of that future, and all of us will benefit from the knowledge shared here at Binghamton and Watson College.”
Together, the faculty members cover a wide spectrum of research interests, from architectural support for security and software/systems security to steganography, artificial intelligence (AI)-based security and mobile security. The approach mirrors what Yang hopes will happen in government, corporate, and nonprofit settings, especially when members of underserved communities earn their degrees and join the workforce.

Strategic Financial focuses on employees to drive growth
UTICA,N.Y. — Taking the helm of a business started by your father can be a daunting prospect. It’s a role that Alan Leist III, CEO of Strategic Financial Services — founded by his father Alan Leist, Jr, in 1979 — takes very seriously, honoring both the responsibility and the privilege the position has afforded him.
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
UTICA,N.Y. — Taking the helm of a business started by your father can be a daunting prospect.
It’s a role that Alan Leist III, CEO of Strategic Financial Services — founded by his father Alan Leist, Jr, in 1979 — takes very seriously, honoring both the responsibility and the privilege the position has afforded him.
“We have this tremendous history and head start, that is a luxury,” he says. Noting that it can be easy to become complacent in such a situation, Leist instead is energized and focused on making the wealth-management firm a continued success.
In that vein, the firm recently opened its fifth new office location, as part of a strategy Leist calls the “Thruway +” plan and is in the midst of renovating its corporate offices as part of a renewed emphasis on workplace culture.
“We’ve been very fortunate to be able to attract great talent, great professionals in upstate New York,” Leist notes. That includes people in Rome, Syracuse, Rochester, Little Falls, and the Troy/Albany area.
Attracting top talent isn’t where the process ends, Leist notes. The firm also has to retain and reward those people so they can provide clients with the best possible service and experience.
“Part of that is meeting them in their community,” Leist says. That goes for clients and employees, he adds. So when Strategic found talent in communities outside its Utica home base, it just made sense to expand the firm’s borders beyond Utica.
That resulted in Strategic renting office space and opening offices at 1320 Floyd Avenue in Rome and 5788 Widewaters Parkway in DeWitt, near Syracuse.
This year, the strategy expanded into Rochester, Little Falls, and Troy, where Strategic rents office space in co-working locations for their employees that live in those areas. Greg Tedone heads up the Rochester location, Laura Powers and Kyle Dempster helm the Little Falls location, and Michael Durand is in Troy.
Branching out this way helps Strategic in several ways, Leist says. Of course, it helped the firm hire these new advisors, but it also casts a net across upstate New York to find new clients.

“Having boots on the ground gives us the opportunity to meet people,” he notes.
Another key initiative to the company’s growth is the remodel of corporate headquarters. “The optimal workspace design is changing,” Leist concedes. Everyone might not be working from home like they did during the worst of the pandemic, but there were definite benefits to having employees who are comfortable and working in a positive space.
The firm was honored in February for the third year in a row as one of InvestmentNews’ “Best Places to Work,” and Leist does not take the honor lightly.
“I think the pandemic was of course a tragedy, but also a wakeup call,” he says. “It reinforced our focus on making sure the team is fully engaged, is happy.”
The Strategic HQ office previously featured enclosed offices around the outside of the space and high-walled cubicles in the center. Realizing now that collaboration is critical to growth, Leist says many of those offices are gone, replaced with glass to let in more natural light.
Those high-walled cubicles are on the way out and will be replaced with workstations divided by lower walls that facilitate interaction and collaboration.
Some offices will convert into breakout/focus rooms where teams can meet when needed, and there will be individual focus rooms as well. Those can be used for things like Zoom meetings with clients or just a quiet space to work when needed, Leist says.
The final growth strategy Strategic is focused on is new technology, being rolled out now for beta testing, that allows clients to interact with the firm in new ways. It’s just another way, Leist says, to meet the clients where they are and provide an optimal customer experience.
That experience, he adds, will hopefully lead to referrals and new clients.
With a team of more than 36 wealth-management professionals, Strategic services more than 1,000 clients (who live in over 30 states) in investment management, financial planning, and corporate retirement plans. The firm manages more than $1.8 billion in assets.

Grow-NY business contest accepts applicants through July 1
Those interested in getting involved in the Grow-NY food and agriculture competition have until the early part of summer to apply. Grow-NY has begun accepting applications for the fourth round of the business contest, Empire State Development (ESD) announced May 16. The initiative seeks to connect “innovators and investors” in the food, beverage, and agriculture
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Those interested in getting involved in the Grow-NY food and agriculture competition have until the early part of summer to apply.
Grow-NY has begun accepting applications for the fourth round of the business contest, Empire State Development (ESD) announced May 16.
The initiative seeks to connect “innovators and investors” in the food, beverage, and agriculture sectors locally and around the globe, ESD said.
The competition has already resulted in economic growth and entrepreneurial opportunity in upstate New York, with “hundreds of new jobs and millions of dollars of follow-on investment” as a result, ESD contended.
The Grow-NY region is a 22-county area spanning Central New York, the Finger Lakes, and the Southern Tier.
The competition attracts high-growth food and agriculture startups to compete for $3 million in total prize money each year and supports 20 finalists through a business-development phase that connects them with the region’s resources.
Gov. Kathy Hochul included funding for three additional rounds of the competition in the latest state budget, ESD noted.
“This fourth round of Grow-NY will further build on the success of earlier competition winners, whose entrepreneurial ideas are fueling economic growth Upstate,” Hope Knight, president, CEO, and commissioner of Empire State Development, said. “These innovative companies have attracted significant investment and are seeding the ground for even more innovation, both throughout the Grow-NY region and around the world.”
Applications must be submitted by July 1. Those interested can apply at website www.grow-ny.com.
Additional details
Winners are required to commit to operating in at least one of the 22 Grow-NY counties for at least 12 months and must agree to a “pay-it-forward” provision in the form of an equity agreement, ESD explained.
One finalist will receive a top prize of $1 million; two others will be awarded $500,000 prizes, and four more will be given $250,000 prizes. Winners will also receive tax incentives and publicity support to announce their achievements across the Grow-NY region and in their home regions.
Funding for the program comes through Empire State Development from the Upstate Revitalization Initiative’s three regional entities, CNY Rising, Finger Lakes Forward, and Southern Tier Soaring, and is administered by Cornell’s Center for Regional Economic Advancement.
“Cornell is proud to support the Grow-NY competition, which plays a vital role in catalyzing food and agriculture start-ups and entrepreneurship across our region,” Benjamin Houlton, dean of the Cornell University College of Agriculture and Life Sciences, said. “By partnering across the public and private sectors, Grow-NY is critical to scaling new technologies and innovations needed to meet our state’s goals for more sustainable food systems that provide healthy, nutritious food to all.”
Onondaga County hotels see 26 percent gain in occupancy in March
SYRACUSE, N.Y. — Onondaga County hotels welcomed more guests in the third month of 2022 than they did in March 2021 as the travel and leisure business continued to rebound, according to a new report. The hotel-occupancy rate (rooms sold as a percentage of rooms available) in the county jumped 26 percent to 54.4 percent
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE, N.Y. — Onondaga County hotels welcomed more guests in the third month of 2022 than they did in March 2021 as the travel and leisure business continued to rebound, according to a new report.
The hotel-occupancy rate (rooms sold as a percentage of rooms available) in the county jumped 26 percent to 54.4 percent this March from the year-prior month, according to STR, a Tennessee–based hotel market data and analytics company. Year to date, hotel occupancy was up nearly 30 percent to just over 48 percent.
Revenue per available room (RevPar), a key industry gauge that measures how much money hotels are bringing in per available room, soared 65.9 percent to $57.68 in Onondaga County in March from a year earlier. Through the first three months of 2022, RevPar has increased 69 percent to $49.35.
Average daily rate (or ADR), which represents the average rental rate for a sold room, climbed 31.7 percent to $106.06 in March from the year-ago month. So far this year, ADR is up more than 30 percent to $102.56.

State to conduct study on payroll-servicing industry after MyPayrollHR scandal
The New York State Department of Financial Services (DFS) will conduct a study on the payroll servicing industry following the MyPayrollHR scandal, which caused “major financial disruptions for workers and small businesses.” The office of Gov. Kathy Hochul on May 6 said she has signed a bill requiring the study. DFS, in consultation with the New
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The New York State Department of Financial Services (DFS) will conduct a study on the payroll servicing industry following the MyPayrollHR scandal, which caused “major financial disruptions for workers and small businesses.”
The office of Gov. Kathy Hochul on May 6 said she has signed a bill requiring the study.
DFS, in consultation with the New York State Department of Taxation, will conduct a study regarding insurance or other risk-mitigation tools and third-party payroll servicers providing these services to “ensure the health of the industry and the existence of sufficient consumer protections.”
The superintendent of financial services will then submit a report of findings and recommendations to the governor, the temporary president of the New York Senate, and the speaker of the New York Assembly.
“Workers and small business owners in New York were devastated by the collapse of MyPayrollHR and it’s crucial we have all the information to understand what led to this crisis,” Hochul said. “The first step in any process is gathering all the information on what’s occurring, and using that data to create a plan moving forward and that is exactly what this legislation will do.”
In 2019, federal authorities found that the president of MyPayrollHR, an upstate New York payroll management company, redirected $26 million in payroll funds to his personal account.
This led to a freeze on MyPayrollHR accounts and distribution of paychecks with funds that did not exist. These transactions were then reversed, resulting in heavy overdraft fees for the workers involved.
The legislation will require DFS to work with the state Taxation and Finance Department to conduct a study on the industry, a first step in reviewing this incident and “seeing what possible prevention techniques may exist,” Hochul’s office said.

N.Y.–based cybersecurity-resilience program gets federal funding
The federal budget includes at least $38 millio for the Multi-State Information Sharing and Analysis Center (MS-ISAC), a federally funded cybersecurity-resilience program. The Center for Internet Security (CIS) in East Greenbush in Rensselaer County operates the MS-ISAC. The office of U.S. Senator Kirsten Gillibrand (D–N.Y.) on March 10 announced that the federal spending plan included the
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The federal budget includes at least $38 millio for the Multi-State Information Sharing and Analysis Center (MS-ISAC), a federally funded cybersecurity-resilience program.
The Center for Internet Security (CIS) in East Greenbush in Rensselaer County operates the MS-ISAC.
The office of U.S. Senator Kirsten Gillibrand (D–N.Y.) on March 10 announced that the federal spending plan included the funding. The $38 million represents an increase of $11 million over the previous year, Gillibrand’s office noted.
A week earlier, CIS released a statement noting that both Gillibrand and U.S. Senate Majority Leader Charles Schumer (D–N.Y.) had called for additional funding “in light of Russia’s invasion of Ukraine and potential retaliatory attacks against the U.S. and other western nations,” per the March 3 CIS announcement.
The lawmakers in a March 2 announcement had acknowledged the importance of the work of the Multi-State information Sharing and Analysis Center. The additional funding would further enable the nonprofit cybersecurity organization to protect the nation’s state, local, tribal and territorial governments (SLTTs), K-12 public schools, universities and hospitals from cyberattacks, CIS said.
“We stand with Sen. Schumer and Sen. Gillibrand … in continuing to emphasize the importance of supporting the cybersecurity of our nation’s State, Local, Tribal, and Territorial (SLTT) governments. Our members, over 12,000 SLTT, are an integral part of the whole-of-nation approach to protecting both our critical infrastructure and essential civil services across the country,” John Gilligan, president & CEO of the Center for Internet Security, said.
About MS-ISAC
The MS-ISAC program is a “successful example” of a partnership-based approach to building cybersecurity resilience and coordination between federal, state, and local entities, Gillibrand’s office contended.
In 2010, the U.S. Department of Homeland Security designated the MS-ISAC as the focal point for cyber-threat prevention, protection, response, and recovery for the nation’s state, local, territorial, and tribal governments as well as cyber fusion centers.
The MS-ISAC is used by all 56 states and territories and more than 12,500 other local governments to receive up-to-date information on and analysis of cyber threats. Additionally, the Center for Internet Security, which houses the MS-ISAC, also houses the Elections Infrastructure Information Sharing & Analysis Center (EI-ISAC), which provides election-systems professionals with a full cyber-defense suite of hardware, software, and expertise to fend off the threat of foreign interference, Gillibrand’s office said.
VIEWPOINT: 4 Tips for Small Firms to Protect Against Cyberattacks
There are many challenges to running a business that owners must face — including the threat of a cyberattack. Cyberattacks are a growing threat for small businesses and the U.S. economy. In fact, according to a recent U.S. Small Business Administration (SBA) survey, 88 percent of small-business owners felt their business was vulnerable to a
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
There are many challenges to running a business that owners must face — including the threat of a cyberattack. Cyberattacks are a growing threat for small businesses and the U.S. economy. In fact, according to a recent U.S. Small Business Administration (SBA) survey, 88 percent of small-business owners felt their business was vulnerable to a cyberattack. Yet many businesses cannot afford professional IT solutions, have limited time to devote to cybersecurity, or do not know where to begin.
Additionally, there is a common misconception among small to mid-sized business owners that due to their size they are not likely to be targeted or considered “high profile” enough. This false mindset can make businesses even more susceptible to cyberattacks. Small businesses are attractive targets as they have information that cybercriminals want, and they typically lack the security infrastructure of larger businesses. As more business is conducted online through cloud services, without the use of strong encryption technology, a hacker can easily access sensitive data behind a door with an easy lock to pick.
Here are four ways in which small to mid-sized businesses can plan ahead and protect themselves against cyberattacks.
Don’t be ignorant
Oftentimes, businesses and business owners think, “it won’t happen to me,” but it’s not a matter of if a cyberattack will happen, but when. Erring on the side of caution is not only the safest thing to do, but also the right thing to do. It is better to be prepared for any type of threat, breach, or attack than to be caught off guard and left in a vulnerable position.
Plan and create policies
When building a cybersecurity plan, be mindful to include an employee-training program and an incident-response plan. The first step to securing your network is to make sure your employees understand security policies and procedures. Establish basic security practices and policies for employees and create employee and IT-related policies that are compliant with the NY SHIELD Act. Companies are considered compliant if they implement reasonable administrative, physical, and technical safeguards.
Educate employees
Cybercriminals are becoming more sophisticated in their methods and employees are often considered “easy targets.” In fact, the majority of malware is delivered via email, putting a business at risk if an employee unknowingly clicks on a phishing email or downloads a suspicious document. Therefore, educating and training employees on the risks, as well as conducting security trainings, are ways to safeguard a business.
Training should not be a one-and-done event. Rather, schedule yearly or semi-yearly refresher courses to keep security top of mind. Help employees understand the importance of updating their software, using secure passwords, adopting security best practices and knowing what to do if they identify a possible security breach.
Invest in cybersecurity software
On top of planning and training, the next step is to invest in cybersecurity software. Businesses need antivirus software that can protect all devices from malware, viruses, spyware, ransomware, and phishing scams. Software should not only offer protection, but also technology that helps you clean computers as needed and resets them to their pre-infected state. Investing in email gateways such as Mimecast, ProofPoint or Microsoft will support cybersecurity plans and tactics.
Safeguard your Internet connection by using a firewall and encrypting information. A firewall acts as a digital shield, preventing malicious software or traffic from reaching your network. There are many kinds of firewalls, but they fall into two broad categories: hardware or software. If your business has a Wi-Fi network, make sure it is secure and hidden. To hide your Wi-Fi network, set up your wireless access point or router so it does not broadcast the network name, known as the Service Set Identifier (or SSID). Also, password-protect access to the router.
Invest in your firm’s safety with cybersecurity planning
Cyberattacks are not going away any time soon and will continue to pose a threat to small and mid-sized businesses. By taking these necessary steps to protect your business, you will safeguard your firm from attack, which will allow you to spend time doing what matters most — running your successful business.
Charlie Wood is executive VP for the FoxPointe Solutions Information Risk Management Division of The Bonadio Group.
Author disclaimer: The summary information presented in this article should not be considered legal advice or counsel and does not create an attorney-client relationship between the author and the reader. Readers with legal questions are recommended to consult with their attorney.
VIEWPOINT: Adopting the assumed-breach mentality on cybersecurity
The cybersecurity landscape is Constantly changing. Everyday, Stories are told of breaches, ransoms, and threat actors pushing us collectively further into uncomfortable territory. Stories like the Colonial Pipeline and Kaseya were major eye-openers for many, but they weren’t the first and they won’t be the last. The recent report, called the State of Ransomware 2022, from
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The cybersecurity landscape is Constantly changing. Everyday, Stories are told of breaches, ransoms, and threat actors pushing us collectively further into uncomfortable territory. Stories like the Colonial Pipeline and Kaseya were major eye-openers for many, but they weren’t the first and they won’t be the last.
The recent report, called the State of Ransomware 2022, from Sophos News (https://news.sophos.com/en-us/2022/04/27/the-state-of-ransomware-2022/) states that 66 percent of organizations surveyed were hit with ransomware in 2021, up from 37 percent in 2020. And, the average ransom paid by organizations that had data encrypted increased nearly fivefold to $812,360. While those numbers are staggering, they aren’t exactly a surprise when you consider the almost daily reports of incidents throughout last year. If you take a moment to look at the reports from last year from a variety of vendors, they all paint the same picture. Cybercrime is on the rise, and in a big way. So, where does that leave us this year?
“Everyone has a plan until they get punched in the mouth.” Boxer Mike Tyson is credited with this quote, and it’s been used many times in recent years. Poorly laid plans go out the window once the worst happens. Applied to cybersecurity, it could probably be “no one wants to plan until they get punched in the mouth.” After an incident is when everyone wants to buy and/or implement security solutions. So how do we prepare ahead of time?
There is a security strategy that has gained more steam in recent years called “assumed breach mentality.” What does that mean? It means that we approach our IT security from the perspective of not if, but when. This can come across as pessimistic. Does it mean we just give up and accept defeat? Hardly. If we continue the boxing example it would mean that we don’t plan and train to never get hit, but instead to expect to get hit and endure. There is no perfect solution or defense. There are strategies and tools that will limit our risk, and there are plans and policies that if put in place correctly, can help us endure when the worst happens.
Letting go and adopting the assumed-breach mentality can be liberating and terrifying. We spend a lot of time trying to figure out how to keep threat actors out, and that is still important. Just because we train to be hit doesn’t mean we want to be hit. We limit our risk as much as we can and prepare for the worst. In shifting that mindset now, we need to start thinking like a threat actor. Look internally at your network, your policies, and investigate your weaknesses. How do we limit the movement of the bad guys in our network, how do we protect key information, and perhaps even more vitally — how do we get back to business? Here are three things we can do to make an impact with our newfound state of mind.
First, we need to evaluate our current security posture and know what to look for. The IBM Cost of a Data Breach Report 2021 (https://www.ibm.com/security/data-breach) lists compromised credentials as the most common attack vector at 20 percent of breaches, and business-email compromise has the overall highest average cost. That gives us something to focus on right away. That means securing your email, using multi-factor authentication, and training your users regularly on phishing emails and to recognize anything suspicious. Of course that is just a start, and it is best to have an objective third party evaluate your vulnerabilities or even perform a penetration test to be more thorough in rooting out any issues present in your environment. While there is a cost to these, they can be invaluable at getting an idea of where you are with your security posture and what changes need to be made.
The second point is basic cybersecurity hygiene. It’s important to understand that all of us are somewhere on the scale of cybersecurity journey to maturity. That’s ok. It’s more important to realize where you are and work to move forward. Where do we start? The National Institute of Standards and Technology (NIST) provides a cybersecurity framework, and many organizations look to that as the standard. Another I am fond of is provided by the Center for Internet Security (CIS). That organization has the CIS Controls (https://www.cisecurity.org/controls/implementation-groups/ig1). There are 18 controls with over 150 safeguards, but CIS has them broken into implementation groups. Group 1 is an evolving list of what is considered basic cybersecurity hygiene and a great place to start. It can provide you an excellent checklist with which to start.
Our last point is having an incident-response plan and cyber insurance. If we think back to boxing again, now that we have planned to avoid getting hit, let’s talk about what happens when we are attacked. Too many organizations realize too late that they didn’t have a plan in place, or that they did, and they had no idea what to do with it. CompTIA has an article (https://www.comptia.org/blog/security-awareness-training-incident-response-plans) that can help get you started. An important point about an incident-response plan is don’t skip the tabletop practice. Knowing what do with the plan when the worst happens is what makes it effective. A bunch of words on a page won’t do anything on their own. Additionally, cyber insurance is another important piece. Find a provider your trust and know what your coverage entails, and who your breach coach is (if your insurance plan has one, and it should). A breach coach is the individual who will help guide you through the process if the worst should happen.
In summary, here are the key takeaways:
• Adopt the assumed-breach mentality
• Evaluate your security posture
• Start on the path toward good cybersecurity hygiene
• Design an incident-response plan and obtain cyber insurance
There are no silver bullets, or cure-all potions. It will take time and effort, but it will be worth it when you need it. I wish you the best on your cybersecurity journey.
Nathan Hock is a virtual chief information officer (vCIO) at Usherwood Office Technology in Syracuse.
VIEWPOINT: Online scams are on the rise, make your business cyber-safe
When pandemic shutdowns shifted the nation’s commerce from in-person to online, cybersecurity experts knew that fraud attempts would follow. Circumstances during the past few years forced many Americans to quickly become far more comfortable with working remotely, banking, and making purchases online. Now, as the pandemic begins to recede as the primary focus of our attention,
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
When pandemic shutdowns shifted the nation’s commerce from in-person to online, cybersecurity experts knew that fraud attempts would follow. Circumstances during the past few years forced many Americans to quickly become far more comfortable with working remotely, banking, and making purchases online. Now, as the pandemic begins to recede as the primary focus of our attention, it’s a mistake to think that online threats will fade too.
As geopolitical tensions rise between Ukraine and Russia, it’s even more important to be aware of fraud attempts. Intense public interest and a willingness to help means that Americans are sharing information and donating online to a wide variety of causes. This is where the risk of exposure increases, because all it takes is one click for your business to be at risk.
Think for a moment about some of the posts you might have seen recently on social media. Many of these include images of bombed-out buildings, stranded dogs and cats, or children huddled in below-ground shelters — all intended to capture your attention and elicit a sympathetic or action-oriented response.
Many of these images are from legitimate sources that are trying to raise money to help, but some are bogus images and videos serving as bait for malware or viruses. Even if the sender is familiar, exercise caution and conduct due diligence before clicking or following any links from emails or social media posts.
Make sure your employees and vendors are vigilant against phishing emails
Cyber threats are everywhere, and criminals take advantage of the human desire for information. An action as simple as opening an email or clicking a link can deploy keyloggers (also called keystroke logging — these are programs that record which keys are struck on a keyboard), remote-access tools or other possible malicious software onto a person’s computer — typically, without the victim even noticing.
Remote work, which allowed many businesses to continue to function at the height of the pandemic, has made employer cybersecurity even more of a challenge. Employees who access company systems from personal computers don’t always exercise the same caution with their personal systems as they do at work. Because of this, a simple click on a personal Facebook post that contains malware can allow criminals to steal passwords and access work product or work systems.
Alert your employees to exercise caution in handling any email with the subject line, attachments, or hyperlinks related newsworthy events — even if it appears to originate from a trusted source. Criminals have become very adept at “spoofing” legitimate organizations by designing emails that look like they’ve come from news or philanthropic organizations. Many of these are phishing email campaigns, circulating using subject lines related to the Ukraine crisis. Do not open unexpected attachments or click on links in suspicious emails.
Once cybercriminals gain access to a system, a lot of the damage is done. They can lock you and your employees out of the company network, demanding a ransom in exchange for returning your own systems to your control. They can access your payment-processing systems and either extort your vendors or pose as a representative of your company to withdraw funds.
This raises another important point: your third-party service providers are subject to the same risks. Know how they interact with your systems, monitor vendor access to your network, and ensure they maintain cybersecurity programs that are in line with your risk tolerance.
Make sure you are speaking with experts about cybersecurity, including your commercial lender, and your business-insurance provider. They are your partners in this fight against fraud.
How to avoid becoming a victim of fraud:
• Educate your employees on how to identify potential fraud.
• Know how your vendors interact with your network and ensure they are following cyber-safe practices.
• Follow CISA’s Shields-Up guidance (https://www.cisa.gov/shields-up), which outlines general cybersecurity practices that will help your business resiliency in the event of a cyber-attack.
• Check out the free tools and resources available from the U.S. Small Business Administration (https://www.sba.gov/business-guide/manage-your-business/stay-safe-cybersecurity-threats).
If you do become a victim of fraud, there are steps you can and should take. One of the first things you should do is notify your bank. It is there to offer support if you have an incident, as well as provide guidance to help you build stronger defenses. Additional resources to help you better prepare your company for the current cyberthreat environment are available from the Cybersecurity & Infrastructure Security Agency at www.cisa.gov.
Terra Carnrike-Granata is senior VP and senior director of information security at NBT Bank, where she designs and implements sophisticated controls to prevent loss and mitigate risk, while also developing innovative ways to educate consumers and businesses on cyber threats.
Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.