Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.
VIEWPOINT: Stopping the Rising Tide of Identity-Theft Cases
The era of COVID-19 has brought enormous suffering and persistent uncertainty to New Yorkers. Adding to both the financial and psychological pain of the pandemic is a dramatic increase in identity theft during the past year. More than 67,000 complaints of identity theft were reported in New York state during 2020, according to the Federal Trade Commission […]
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The era of COVID-19 has brought enormous suffering and persistent uncertainty to New Yorkers. Adding to both the financial and psychological pain of the pandemic is a dramatic increase in identity theft during the past year.
More than 67,000 complaints of identity theft were reported in New York state during 2020, according to the Federal Trade Commission (FTC). That was a record number, up 85 percent from the previous year and more than four times the figure of a decade earlier.
Whether identity theft involves credit cards, bank accounts, business or personal loans, government benefits, or other types of transactions, it carries significant risk of financial loss to the victim. The U.S. Department of Justice reported $15.1 billion in financial losses nationwide in 2018. Even when there is no direct monetary loss, addressing the consequences of stolen personal information can take months of complicated work with banks, utility companies, medical offices, and others. Sometimes the worst damage comes later, when victims have trouble getting a job, renting an apartment, obtaining a tax benefit, or receiving a loan because of a stolen identity.
New York State has taken numerous steps in recent years to address identity theft, which is punishable by up to seven years in prison, and to require that businesses and state agencies safeguard private personal information. But clearly, more must be done.
Each of us can and should take common-sense steps such as making sure to keep Social Security numbers confidential and being careful to limit use of birth dates and other personal information in online communications — including social media.
Governmental and independent consumer advocates offer a number of other recommendations for individuals.
As policy makers at all levels of government consider additional responses to identity theft, private businesses large and small that collect and maintain personal information must redouble their efforts to safeguard such data. Social-media companies, whose business models rely heavily on personal information, should take steps to promote best practices, such as educating users about ways to keep private information confidential. Working together, we can reverse the rising tide of identity theft.
Thomas P. DiNapoli is the New York State Comptroller. This article is drawn from the executive summary to a report, titled, “The Increasing Threat of Identity Theft,” which his office issued in May. To check out the full report, visit: https://www.osc.state.ny.us/files/reports/pdf/increasing-threat-of-identity-tBheft.pdf

System automation to keep fueling cyberattacks, expert says
ROME, N.Y. — Cyberattacks against critical infrastructure have grown significantly in the last few years and the numbers are likely to continue to rise as more systems are automated and connected to networks. That’s according to Eric Thayer, principal engineer for systems analysis and exploitation at Assured Information Security (AIS), which is based in the
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ROME, N.Y. — Cyberattacks against critical infrastructure have grown significantly in the last few years and the numbers are likely to continue to rise as more systems are automated and connected to networks.
That’s according to Eric Thayer, principal engineer for systems analysis and exploitation at Assured Information Security (AIS), which is based in the Griffiss Business & Technology Park in Rome.
“At AIS we regularly analyze the security of complex systems, such as those that may have been supporting the pipeline. We have a team that specializes in identifying weaknesses and hardening safety critical systems,” Thayer said in a May 12 news release.
He was referring to the May 8 shutdown of the main fuel supply line to the U.S. east coast following a cyberattack against Colonial Pipeline.
AIS — a cyber and information-security company serving government and commercial customers that is observing two decades in business — says it understands the importance of the computer systems and networks supporting critical infrastructure, such as a fuel-distribution pipeline, to be evaluated on a regular basis for secure design and implementation.

Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
“Cyber threats are constantly evolving, and it is important for companies to understand the impact of vulnerabilities before they are discovered and to be prepared with plans in place to mitigate potential threats,” said Thayer. “End to end vulnerability assessments and secure product consulting are services we often encourage our customers to consider. These services help to proactively identify weaknesses before they are exploited and we can build systems securely from the ground up, minimizing potential threats.”
About AIS
As of 2021, AIS has a national footprint with 10 office locations across the country and an additional five customer locations. Locally, it has an office at 250 South Clinton St., in addition to the Rome headquarters. AIS also has an office in Rochester.
Since inception in 2001, the company has completed 337 contracts and is currently fulfilling 45.
AIS has an employee count of 300 as it marks 20 years in operation, per a June 28 news release. Over the past two decades, AIS has been awarded 17 patents and currently has 11 filed.
The AIS “ecosystem” is a collection of separate entities operating under the AIS umbrella, the firm says. In 2016, AIS became majority owner of GreyCastle Security, a provider of risk-assessment, mitigation, and certification-readiness services headquartered in Troy in the Capital Region. This year, AIS supported the founding of AssuredTek, a growing company that provides support and defends business systems, networks, and assets using an array of technology and professional services.
AIS focuses on research, development, consulting, testing, cyber-forensics, remediation, and training. It works with the U.S. Department of Defense (DoD) and has collaborative ties with other defense contractors and more than a dozen universities.

SUNY Poly cybersecurity program places 4th in nationwide ranking
MARCY, N.Y. — Study.com’s 2021 list of the “Top Bachelor’s Programs in Cyber Security” ranks SUNY Polytechnic Institute’s program fourth nationwide. Dakota State University of Madison, South Dakota tops the list; New England Institute of Technology in East Greenwich, Rhode Island is ranked second; and Oklahoma State University Institute of Technology in Okmulgee, Oklahoma is
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
MARCY, N.Y. — Study.com’s 2021 list of the “Top Bachelor’s Programs in Cyber Security” ranks SUNY Polytechnic Institute’s program fourth nationwide.
Dakota State University of Madison, South Dakota tops the list; New England Institute of Technology in East Greenwich, Rhode Island is ranked second; and Oklahoma State University Institute of Technology in Okmulgee, Oklahoma is ranked third, per study.com.
In its program, SUNY Poly says it prepares students to become cybersecurity professionals for work in the “high demand” industry and government sectors. The school’s researchers also work with the Air Force Research Laboratory-Information Directorate (AFRL/RI), also known as Rome Lab. For example, professor Hisham Kholidy is currently working with the AFRL/RI as a 2021 visiting faculty researcher, developing a testbed for research in protecting 5G systems from cyberattacks.
SUNY Poly’s network and computer security (NCS) program began in 2010, in response to the need for cybersecurity education and training. It replaced the telecommunication program that served industry for more than 20 years. Since then, the NCS cybersecurity program works to produce graduates for jobs in the statewide and regional cybersecurity workforce.
The program is based in computer science, and the NCS department shares faculty, courses, and computing infrastructure with SUNY Poly’s computer science department. The programmatic focus on computer science and networking helps prepare graduates for the largest segment of the cybersecurity job market, which is in technical positions such as cybersecurity analyst, penetration-testing professional, incident-response specialist, and network engineer, the school said.
VIEWPOINT: 1 Thing Most Cyber Breaches Have in Common: Lack of Education
Cybersecurity breaches are nothing new, but several high-profile cases recently are bringing new attention to a serious and growing problem. Malicious actors are getting more sophisticated in their attempts to subvert systems, using tactics such as spear-phishing to prey upon employees’ willingness and desire to be helpful. The average cost of a breach in the U.S. is
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Cybersecurity breaches are nothing new, but several high-profile cases recently are bringing new attention to a serious and growing problem. Malicious actors are getting more sophisticated in their attempts to subvert systems, using tactics such as spear-phishing to prey upon employees’ willingness and desire to be helpful.
The average cost of a breach in the U.S. is $242 per record. Regaining trust and repairing a corporate reputation could add on to that expense significantly.
The fact that this is a growing problem is undeniable. There are a lot of reasons for the rise in cybercrime, including the sudden switch to remote work brought about by the COVID-19 pandemic. But even when employees are in the office, it’s easy to fall for a phishing scam, or leave systems vulnerable due to poor password habits. Here are just a few of the top vulnerabilities:
• Weak passwords — Choosing overly simple or easily guessed passwords is a long-standing risk.
• Unrestricted web browsing — Accessing the web is a modern business tool that can have many advantages, but unrestricted web browsing can lead employees to accessing sites riddled with malware, putting your systems at risk.
• Social-engineering scams — Social-engineering scams capitalize on the desire of employees to be helpful. Some of these scams might even happen over the phone, with scammers posing as coworkers or vendors, tricking your employees into disclosing passwords or bank-account numbers.
• Phishing, spear-phishing, and link scams — Email scams are widespread. Typically, an employee will receive an email that appears to be from a trusted source, such as a bank or vendor website, and will ask an employee to click a link to verify their account information. Once this process is complete, the attacker has access to your private information.
• Poor document control — Unlocked file cabinets, post-it notes that contain the latest passwords to systems, storing sensitive information in easily accessible files, discarded paperwork that remains un-shredded, and even documents left on printers are all examples of weak document security that could compromise your systems.
• Outdated or disabled browser-security software — Without the latest versions of anti-virus software in use on every machine, your office could be vulnerable.
Examining this list, it’s clear that malicious actors have two primary means by which to gain access to your systems: through holes in your technology, or by manipulating your employees. Businesses are aware that this is a problem, yet still can struggle to implement measures that will harden their cybersecurity defenses. Why is there such a disconnect?
Cost is frequently mentioned as a factor in delaying cybersecurity improvements. Although it is true that businesses may have additional IT expenses, especially if they are still using outdated hardware and software, the costs of upgrading systems will likely pale in comparison to the financial and reputational costs of a breach.
The most impactful step companies can take in hardening their cybersecurity defenses is training employees. All breaches share one commonality: educating people can reduce the rate of these attacks.
Cybersecurity training is not a one-time event. Rather, it is ongoing learning that will make the biggest difference. Short, frequent training will have a lasting impact — and, recurrent lessons allow for changes to be made in training, to adapt as malicious actors change their tactics. I’m reminded of Ben Franklin’s quote: “Tell me and I forget, teach me and I may remember, involve me and I learn.”
You’ll need to involve every employee. Each person who has access to email or who uses your computers must be trained — including interns, and all the way up to the CEO. Malicious actors have become very adept at mimicking legitimate websites, and whether it is through a lack of understanding, carelessness, or unfamiliarity with the risks, employees are putting companies at risk.
Training doesn’t have to be expensive. Leaders should look to third parties to conduct training as threats and tactics so quickly evolve. Video training is available at a reasonable dollar amount, and the Center for Internet Security has a list of free resources.
Cybersecurity training is one of the most essential steps you can take to protect your business. If you need help, reach out to your financial institution for recommendations. It, along with organizations such as the Cybersecurity and Infrastructure Security Agency (CISA), the Small Business Administration (SBA), and the Department of Homeland Security (DHS) have resources and help for companies of all sizes.
Terra Carnrike-Granata is senior VP and director of information security at NBT Bank. She is responsible for designing and implementing sophisticated controls to prevent loss and mitigate risk, while also developing innovative ways to educate consumers and businesses on cyber threats — helping to keep companies and consumers protected. For more information, visit www.nbtbank.com/businessfraudinfo.

VIEWPOINT: Ransomware Dissected
Dan Kalil, chief executive officer at GreyCastle Security and chief commercial officer at Assured Information Security (AIS), weighs in on the significance of this malicious technology and what organizations can do to protect themselves. What exactly is ransomware? “This evolving form of malicious software is used by criminals, often for the purposes of financial gain,”
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Dan Kalil, chief executive officer at GreyCastle Security and chief commercial officer at Assured Information Security (AIS), weighs in on the significance of this malicious technology and what organizations can do to protect themselves.
What exactly is ransomware?
“This evolving form of malicious software is used by criminals, often for the purposes of financial gain,” says Kalil. “Its premise is simple — attackers will lock a user or organization’s files so that they can’t access them and will only unlock them if the ransom is met. Typically, a ransom demand has both time and money attached to it.”
These attacks have become increasingly prevalent among government entities and critical infrastructure as tactics become more and more advanced.
What is the impact of ransomware?
“It’s the largest and most common threat in the cybersecurity world right now,” says Kalil. “Not only do organizations suffer substantial financial loss, but company operations can be disrupted because their files are locked and organizations can’t access them. These disruptions can range from minor to major, as we saw with the Colonial Pipeline being fully unable to operate.”
According to the Washington Post, in recent years, ransomware attacks have affected organizations ranging from banks and hospitals to universities and municipalities — almost 2,400 organizations in the U.S. alone were victimized in 2020. Attackers are increasingly targeting industrial sectors because these firms are more willing to pay up to regain control of their systems, experts say.
In the case of the attack on the Colonial Pipeline in May, the company was forced to pay $4.4 million to attackers and had to shut down operations for nearly six days. As a leading fuel provider for much of the East Coast, this was a massive impact.
Who is at risk?
According to the Cybersecurity & Infrastructure Security Agency, anyone with a computer connected to the internet is at risk of being attacked by ransomware.
“While every person and business are at risk, we are currently seeing ransomware being used against businesses that have the means to pay large ransom sums and/or provide a critical offering that if unavailable, could cause significant risk to security, life and commerce,” says Kalil.
Individuals and organizations with access to critical data such as those in health care, technology, finance, education, utilities, and retail should take extra precautions to ensure they are protected.
What can be done to prevent an attack?
“Cyber threats are always evolving and it’s important for companies to practice good cyber-hygiene that include continuous identification and elimination of critical vulnerabilities that could be exploited as well as having access to real-time insight into your network operations, providing the ability to detect and eliminate threats early,” says Kalil. “End-to-end vulnerability assessments and secure product consulting are services we often encourage our customers to consider at AIS and GreyCastle Security. These services will help to proactively identify weaknesses before they become a problem. Then, customized solutions can be built to minimize potential threats.”
Conclusion
While the threat of ransomware is not going away in the near future, it’s important to remember there are ways to protect yourself and your organization.
Millie Occhionero is the digital-communications lead at Assured Information Security (AIS). Contact her at communications@ainfosec.com.
VIEWPOINT: Website Terms of Use and Privacy Policies
Booming internet usage means that virtually every company has a website, and many companies use their website to enhance the user experience and collect information about their users. As a result, company websites have terms of use and privacy policies that were developed to govern the interaction between the user and the company through its website. Many
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Booming internet usage means that virtually every company has a website, and many companies use their website to enhance the user experience and collect information about their users. As a result, company websites have terms of use and privacy policies that were developed to govern the interaction between the user and the company through its website.
Many businesses, however, developed their website’s terms of use and privacy policy when their websites were last substantially revised, and no one has paid attention to them since. Of more concern, some companies “cut and pasted” terms of use and privacy policies from other websites or used template forms available on the internet. While these may be a good start, they may miss some key provisions that should be included to protect your company and comply with the law.
This article reviews what needs to be included in terms-of-use agreements and privacy policies for company websites so that you can determine whether your company needs to review and update any of the provisions in them to better protect your company.
Terms-of-use agreements
These provisions are typically included in a hyperlink at the bottom of a webpage. They can also be named terms of service, terms and conditions, conditions of use, or similar phrases. The first rule about these provisions is that they should be easy to read and understand. The provisions are intended to be a legal agreement binding on the website user which establish the terms a user must abide by to use the website.
Terms-of-use provisions generally include:
• Agreement to use the website only for lawful purposes (prohibits use of malware or other software that interferes with the content or use of the website);
• Disclaimer that the information on the site is for general information purposes and there is no warranty regarding the accuracy, completeness, or usefulness of the information. The disclaimer should extend to third-party content if used on website;
• Acknowledgement that website content is owned by the company and is protected by copyright, trademark, and other intellectual-property laws, and the material cannot be reproduced or modified;
• If the website contains message boards, chat rooms, or other interactive features, terms governing user-generated content so that user-posted material does not violate laws or company standards;
• An explanation of what information the company may collect from its website users and a link to the company’s privacy policy;
• Notice that the terms of use may be revised and updated from time to time and that all changes are effective immediately upon posting;
• Email address for feedback or comments relating to the website; and
• Traditional contract provisions such as disclaimer of warranties, limitations on liability, governing law, and indemnification.
Note that the terms-of-use agreement for your website should be tailored to fit your website, its functionality and your company. Terms of use are important if accounts can be created on your company’s website because they set the rules about how the account system operates. Moreover, if there are links to social-media features, specific concerns about copyright infringement (especially if there is user-generated content), concerns about collecting personal information of children using a site or industry-specific regulations (e.g. banking and financial services), there may be additional language that should be added to the terms-of-use agreement to protect your company.
“Browsewrap” vs. “clickwrap” agreements
A browsewrap terms-of-use agreement exists when the terms of use are referenced on the website’s main page by a hyperlink to the complete provisions where there is a conspicuous notice that, by using the website, the user agrees to the terms of use. The website user must click on the hyperlink to see the terms that bind the user. Generally, courts have held that browsewrap agreements will be binding on the user when the user is encouraged by the design and content of the website to examine the terms available through the hyperlink. However, courts have taken disparate views on whether a website is, in fact, appropriately designed to encourage the user to click on the terms-of-use hyperlink. If your company is using a browsewrap terms of use, a message should be displayed in a prominent position on the site’s pages, notifying users that the website is governed by the terms of use and that users who do not agree to the terms must not access or use the site. This message should provide a link to the full terms of use and be located so that users can see the notice without having to scroll down the page.
A clickwrap terms-of-use agreement exists when a pop-up, or series of pop-ups, appear when users visit the website that informs them that they must review and agree to the terms of use to use the site by clicking to indicate agreement. This is a clearer means to show user agreement to the terms of use and are more likely to be found enforceable by a court than browsewrap terms. E-commerce sites where users are purchasing products or services and websites where social media is being uploaded or posted are advised to use clickwrap terms-of-use agreements to ensure enforceability of their terms.
Privacy policies
Your privacy policy should disclose your practices for the collection, use, handling, and sharing of data from your users. Privacy policies are now required by several federal, state, and foreign laws, particularly if your company is collecting data to identify individuals (e.g. email address, name, mailing address, social-media information, etc.). Any third-party advertising or analytics provider that your company engages to help optimize website use will require an acceptable privacy policy be posted by your company before it will integrate their services on your website.
It is a good practice to have a privacy policy even if your company is not collecting data that could identify individuals, if for no other purpose than to inform your users that you are not collecting any individually identifying data.
Your privacy policy should be easy for users to read and understand. It should be clearly and conspicuously accessible on the website. A link to the policy must be conspicuously placed wherever personal information is collected. It should truly reflect the company’s actual business practices. The policy should not make any statements about the company’s privacy practices that may turn out to be untrue.
A privacy policy that meets the requirements of most data privacy-laws should include the following provisions:
• A description of what kind of information you collect from users, why you collect it, how you use it, how long you store it, and what information is shared with third parties;
• Disclosure on whether and how you use cookies or other tracking technology;
• Disclosure that the company may have to release collected user information in response to warrants, subpoenas, or other legal process;
• How to request changes to, or a review of, any information of the user that is collected and stored;
• An opt-out procedure for users who do not want their information shared with third parties or used by the company;
• The method that will be used by the company to notify users of any changes to its privacy policy; and
• The policy should identify the date it was last revised.
The word “privacy” should be used in the title of the policy and any links to the policy.
Note that if your company sells advertising for its website that has click-through features or uses a vendor’s technology for analytics, those third parties may be collecting user data as well and your privacy policy also needs to disclose the privacy practices of those third parties.
Template privacy policy should not be used for most websites. Instead, a privacy policy should be carefully drafted that is informed by the company’s actual information collection and privacy practices.
Importantly, as technology evolves, so does the information that might be mined from company websites. Your company should periodically audit its compliance with its posted privacy policy and confirm that its practices, such as allowing users to opt-out of certain uses or disclosures (for example, to unsubscribe to a mailing list), are being followed. Failure to comply with what you have promised to do in your privacy policy exposes the company to potential liability.
While provisions in terms-of-use agreements and privacy policies on company websites may look “boilerplate,” they are not. These must be tailored to the capabilities and functions of your website and to the specific information that is being collected and stored from user use.
Gail M. Norris is a senior counsel in the Rochester office of the Syracuse–based law firm of Bond, Schoeneck & King PLLC. She works in Bond’s Cybersecurity and Data Privacy practice. Contact Norris at gnorris@bsk.com. This article is drawn from the law firm’s Cybersecurity and Data Privacy Information Memo.
VIEWPOINT: Cyberattacks Take Aim at Business
While hacking, data theft, and corruption dominate the headlines, the threats to businesses posed by cyberattacks stretch far beyond the digital realm. Consumers are increasingly concerned about the security of their information that is held by companies they patronize and are negatively influenced if they believe a business is not adequately protecting data. A PricewaterhouseCoopers survey found
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
While hacking, data theft, and corruption dominate the headlines, the threats to businesses posed by cyberattacks stretch far beyond the digital realm. Consumers are increasingly concerned about the security of their information that is held by companies they patronize and are negatively influenced if they believe a business is not adequately protecting data. A PricewaterhouseCoopers survey found that 87 percent of consumers are willing to take their business elsewhere if or when a company has a data breach.
In the wake of highly publicized attacks, business expenditures for cybersecurity reached $123 billion in 2020 according to the research firm Gartner. At the same time, studies conducted by the insurance firm Hiscox found that more than 70 percent of businesses are still unprepared for a cyberattack. The rapid race by businesses of all sizes to leverage technology to improve efficiency and gain competitive advantage has brought with it an unprecedented host of complex threats that most are ill-prepared to protect themselves against.
For centuries, entrepreneurs have had to overcome physical threats such as fire, flood, and theft to avoid being the next shop with a “Going Out of Business” sign in the front window. These risks were largely visible, tangible, local, and not likely to change quickly over time. On the contrary, threats to digital assets are everything that physical risks are not. They are virtual, invisible, global, and rapidly evolving. Mitigation strategies that are effective against a particular computer attack right now might be rendered permanently obsolete in the next few seconds.
While the world’s consumers create a seemingly insatiable demand for connectivity and 24/7-anywhere access to information of all kinds, businesses are racing to stay relevant in an increasingly tech-dominated world. Unfortunately, security is the often-overlooked component of this race forward, falling victim to budget constraints, ignorance, and apathy.
As technology evolves, so do the threats to its security. The first hackers often focused on gaining access to systems just to prove they could. Damage to, or theft of data was rare. Much has changed in just a few short decades. Modern cyberattacks are coordinated, sophisticated, and well-funded operations often run by criminal enterprises or even nation states. The goals of exploiting security weaknesses are largely financial, but also increasingly include corporate or political espionage.
Of all the modern cybersecurity threats, ransomware has rightly dominated the headlines. In the simplest terms, this attack traditionally involved “kidnapping” the victim’s data in place by encrypting it with a password only known to the attacker. The data was technically still on the victim’s systems; however, it was completely inaccessible. The key to unlock the data would ostensibly be provided after the victim paid the demanded ransom. Attackers would indiscriminately attempt to infect millions of computers without regard to the importance of the systems, or the potential victim’s ability or desire to pay the demanded fee. Surviving a traditional ransomware attack was largely a mixed bag. Sometimes victims paid the ransom and regained access to their files, sometimes the ransom was paid, and the key was never provided and, in some cases, even the attackers lost track of how to decrypt the files. For years, mitigation steps for ransomware relied heavily on restoring lost data from backups and eliminating the security gaps that allowed the attack to occur in the first place.
In the past few years, ransomware attacks have evolved into much more sinister and sophisticated attacks. Businesses and government entities are now the preferred targets, with a preference for critical infrastructure and services. The “kidnapping in place” model has also been modified to include the theft of sensitive data and attempts to establish long-term, persistent access to the victim’s computer systems that can be used to conduct further malicious acts. Stolen data is increasingly being used to further extort the victim through threats to release it publicly if the ransom is not paid. This was recently highlighted when the Washington D.C Police Department was attacked by ransomware and the attackers subsequently posted police officers’ personnel records and street-gang intelligence information on the Internet when their demands were not met.
Contrary to the beliefs of some people, ransomware attacks can be prevented, mitigated, and you can recover from them. Like the attacks themselves, cyber protection and prevention mechanisms are rapidly evolving and necessarily must be complex and comprehensive. The need for sophisticated prevention, protection, and response mechanisms places modern cybersecurity outside the reach of traditional information technology departments and do-it-yourself operations.
Ransomware prevention, like all other cybersecurity, requires a multi-faceted approach from numerous disciplines. There is no single tool, software, or procedure that can do it all. The following list highlights a comprehensive methodology for ransomware prevention and preparedness:
• Be proactive. Recovery after an attack is more difficult and expensive than preventive measures
• Engage cybersecurity specialists
• Conduct periodic vulnerability assessments and penetration tests of all networks and systems
• Remediate all known and identified security gaps
• Create, test, and utilize comprehensive disaster recovery and business-continuity plans
• Ceate and test full, offline backups of all critical data
• Create, test, and utilize incident-response plans that address cybersecurity threats
• Establish retainer agreements for cyber-incident response specialists
• Budget appropriately. Security costs are necessary and recurring.
Cyberattacks and risks to data security represent a clear and present danger to the ability of companies of all sizes and sectors to grow and prosper. A single attack against an ill-prepared business can cause crippling recovery costs and damage customer confidence beyond repair. The takeaway from the many entities that have suffered and recovered from cyber incidents in the past is that it does not have to be a death sentence. In the end, those that are proactive, plan, and prepare will be the ones most likely to survive and thrive in this rapidly changing landscape.
Tony Martino is co-founder and chief operating officer of Anjolen Inc. Contact him at Tony@anjolen.com.
VIEWPOINT: DOL Issues New Cybersecurity Guidance for Plan Sponsors, Others
On April 14. 2021, the U.S. Department of Labor (DOL) issued much-needed guidance concerning best practices for plan sponsors, fiduciaries, record-keepers, participants and beneficiaries pertaining to cybersecurity for retirement plans. The DOL’s guidance focuses on three specific topics: hiring service providers, managing cybersecurity risks, and online-security tips for participants to avoid risk of fraud and loss. Although
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
On April 14. 2021, the U.S. Department of Labor (DOL) issued much-needed guidance concerning best practices for plan sponsors, fiduciaries, record-keepers, participants and beneficiaries pertaining to cybersecurity for retirement plans.
The DOL’s guidance focuses on three specific topics: hiring service providers, managing cybersecurity risks, and online-security tips for participants to avoid risk of fraud and loss. Although the guidance was couched as “best practices,” it is reasonable to interpret it as creating minimum cybersecurity standards and practices for retirement plans. The guidance specifies the duty of plan fiduciaries to protect plan data against cybersecurity breaches and attacks, and potentially signifies a precursor for the DOL to assess liability for damages stemming from plan data breaches in the future. Although the guidance did not address health and welfare plans, those plans may also wish to consider implementing these measures.
Here is a summation of some of the key points raised in the guidance, as well as some helpful insights to be considered in connection with the DOL’s recommendations.
I. Hiring service providers
Under ERISA, plan fiduciaries must act prudently when selecting and retaining plan-service providers. Since plan-service providers are often relied upon to preserve and secure plan records and participant data, it is essential that fiduciaries ensure that service providers implement strong measures to defend this information against potential cyber threats. When retaining service providers, the DOL recommends that plan sponsors make certain that vendors have sufficient security systems in place to guard against attacks and prevent potential breaches. The DOL offered the following suggested practices when contracting with service providers:
• Security standards: Review providers’ security standards, practices, and policies. Request audit results verifying the sufficiency of their security systems and compare these results to industry standards. Plan fiduciaries should look for vendors who follow a recognized information security standard that validates its compliance and utilize an independent auditor to verify information security, system/data availability, processing integrity, and data confidentiality.
• Effectiveness review: Verify the security standards employed by service providers and their validation process to ensure their security practices comply with these requirements and ensure that their audit results reflecting compliance are available for review.
• Reputation in the industry: Check service providers’ track record in the industry, including any public information related to prior security incidents, as well as any litigation and legal proceedings related to their services.
• Prior incidents: Consider vendors’ previous security breaches, reviewing all details regarding those incidents and their response to the attacks.
• Insurance coverage: Review the service providers’ cybersecurity-insurance policies and their scope of coverage to address losses incurred from security breaches or identity thefts. Confirm whether their insurance coverage will cover breaches caused by both their own workforce, as well as external attacks. Consider requiring vendors to maintain additional insurance coverage (i.e., professional liability, errors and omissions liability, cyber liability and privacy breach insurance, and/or fidelity bond or blanket crime coverage). Confirm policy limitations before counting on such coverage for loss protection.
• Ongoing compliance: Ensure that contracts require vendors to maintain their cybersecurity and information security standards originally agreed to by the parties throughout the term of the contract, and beyond (if applicable). Consider requiring notice in the event of a change in their systems which impacts their ability to meet these criteria, or deviations from their prescribed security standards.
• Limitation of liability: Address any contractual provisions which seek to limit responsibility or liability of the service provider for cybersecurity breaches.
• Reporting: Require annual third-party audits to determine compliance with cybersecurity policies and procedures and require access to the results of those reviews.
• Data usage: Specifically dictate vendors’ obligations to preserve the privacy of all confidential data, prevent any use or disclosure of confidential information without written permission, and incorporate a stringent standard of care to guard against the unauthorized use (or misuse), access, loss, disclosure, or modification of confidential information.
• Records retention and destruction: Specify vendors’ obligations to comply with all applicable federal, state, and local laws, rules, regulations, directives, and other governmental requirements pertaining to the privacy, confidentiality, or security of confidential information.
• Notice: Include terms requiring vendors to provide notice for any incident or breach, specifying the timeframe for such notice and mandating service providers’ cooperation to investigate and address the cause of the breach.
II. Cybersecurity best practices
The DOL has provided this list of best practices for plan record keepers and other service providers to follow:
• Save a formal, well-documented cybersecurity program;
• Conduct prudent annual risk assessments;
• Have a reliable annual third-party audit of security controls;
• Clearly define and assign information security roles and responsibilities;
• Have strong access control procedures;
• Ensure that any assets or data stored in a cloud or managed by a third-party service provider are subject to appropriate security reviews and independent security assessments;
• Conduct periodic cybersecurity-awareness training;
• Implement and manage a secure-system development life-cycle program;
• Have an effective business-resiliency program addressing business continuity, disaster recovery, and incident response;
• Encrypt sensitive data, both stored and in transit;
• Implement strong technical controls in accordance with best security practices; and
• Appropriately respond to any past cybersecurity incidents.
III. Online-security tips
The DOL also outlined a number of security tips, reflecting that participants and beneficiaries also play a large role in the security of their plan accounts. The DOL recommends that users utilize strong and unique passwords for their accounts, add multi-factor authentication to log in, and regularly monitor accounts to guard against the risk of fraud and loss. In addition, the DOL suggests that participants and beneficiaries update their contact information with plans and sign up for account activity notifications to ensure they are notified of any unauthorized account activity. Among the other tips offered, the DOL urges users to avoid public Wi-Fi networks, remain mindful of phishing attacks, and use up-to-date antivirus software.
Retirement-plan precautions
Retirement plans are literal treasure troves for cyber criminals — holding large amounts of fund and personal information concerning participants and beneficiaries. Recognizing this concern, the DOL’s new cybersecurity guidance may provide a glimpse into future enforcement actions and criteria to assess prudence by fiduciaries in the event of a cyberattack. Plans should consider these tips and insights when engaging new service providers to ensure vendors are taking appropriate precautions to safeguard plan data. They may also wish to revisit current contracts with their present vendors to address any areas where their contracts are silent, as well as consider whether additional measures are necessary to ensure the security and confidentiality of plan data.
Administrators may also wish to review and update their plans’ document and retention policies to reflect this new guidance and review their vendors’ policies to confirm if amendments are warranted — with a particular focus on how vendors handle plan data upon expiration or termination of their agreement.
Despite recognizing the important role played by participants and beneficiaries in securing their plan accounts, recommendations regarding cybersecurity education were notably absent from this guidance. Nonetheless, plans may wish to consider passing along the DOL’s online-security tips to account holders.
Lawrence J. Finnell is a senior counsel in the New York City office of the Syracuse–based law firm of Bond, Schoeneck & King PLLC. Contact him at lfinnell@bsk.com. This article is drawn from the firm’s Employee Benefits Law Information Memo.
VIEWPOINT: Preparing for Ransomware
A look at recent news headlines continues to show the impact that ransomware has on our everyday life. Whether it be the attack on Colonial Pipeline which set off a potential gas-supply shortage or the attack on JBS, a meat packer, the news keeps coming. Last year in the U.S. alone, more than 100 federal, state, and local
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
A look at recent news headlines continues to show the impact that ransomware has on our everyday life. Whether it be the attack on Colonial Pipeline which set off a potential gas-supply shortage or the attack on JBS, a meat packer, the news keeps coming. Last year in the U.S. alone, more than 100 federal, state, and local governments; 500 health-care centers; 1,600 educational organizations; and thousands of businesses were victims to ransomware. That’s according to “The State of Ransomware in the US: Report and Statistics 2020,” published by Emsisoft Malware Lab in January.
That impact is also felt by small and mid-sized businesses (SMBs) as it was found in 2020 that the average cost of a ransomware event for SMBs totaled $505,827 per incident (including downtime, lost business, rebuilding and upgrades, etc.). The cost is only increasing, especially when you consider lost revenue and reputational harm to your business. According to the Beazley Group, a cyber-liability insurance provider, small and medium businesses are most at risk of ransomware, with more than 62 percent of claims. Beazley also reports that ransomware attacks increased 130 percent in 2020.
In the past two years, the Cyber Defense Institute has assisted clients with ransomware incidents that ranged in cost from $600,000 to over $10 million right here in Central New York. Many ransomware attacks do not get reported as companies fear reputation loss and bad press. As a result, experts agree that the true number of attacks and cost of those attacks is grossly underestimated.
Ransomware is a type of computer malware that has a specific goal in mind — holding your data hostage until you pay a ransom. Early variants of ransomware would install on a single computer in your network and wreak havoc on your shared files. Today’s variants are using more sophisticated techniques in which they worm their way through your network, sometimes for months without detection, before detonating on as many systems as they can at once. This increases the likelihood you’ll pay the ransom because all your servers and workstations are infected all at once.
Recommendations
Awareness training. The most-common method of infection from ransomware is still malicious emails. Another common method is so called “drive by downloads” in which a malicious file is downloaded from an infected website. Because of this, end-user security awareness training is one of the key strategies you should be implementing to protect your business from ransomware. This end user-training should include continuous phishing training and at least one hour several times per year of direct computer-based training content. This phishing training should include a system that sends fake phishing emails to your users to give them real-world experience dealing with phishing emails. Weekly security reminders that detail the most-current threats and scams are also highly effective.
Two-factor authentication for applications and email is another easy win. Stolen credentials allow criminals to steal data and send malicious emails using legitimate email addresses to unsuspecting friends and colleagues.
Anti-virus/malware software. Another critical component to your anti-ransomware strategy needs to be anti-virus/malware software that can prevent advanced threats such as ransomware. Traditional antivirus is no longer enough and the need for advanced-threat protection is critical. Software that includes endpoint detection and response (EDR) features are commonly used in cases of ransomware to help clean it up and stop it from spreading. For this reason, you should consider a similar product to help protect your environment. It also goes without saying that it is critical that you maintain your subscriptions with your antivirus vendor. There is nothing worse than getting a malware infection because you forgot to renew your antivirus license or update your current product regularly.
Implement a SIEM — Security Information and Event Management System — to provide continuous monitoring of your network 24/7, 365 days a year, which can also be coupled with a dedicated Security Operations Center (SOC) to notify you of incidents. These systems provide real-time alerts of suspicious or malicious activity on your network, enabling a fast response and prevention.
System patches and updates are another key component to reducing the risk of ransomware. Making sure you run your Windows updates on every machine, all the time, keeps your systems protected from the latest vulnerabilities. Don’t forget to keep your firewalls, printers, and other network devices up to date as well. These commonly forgotten devices are also frequently attacked by malicious actors and can lead to ransomware or other harm to your network.
Cyber-liability insurance. When you buy an insurance policy, it should specifically cover ransomware or data-extortion costs. And do not skimp on coverage limits. We recommend a minimum of $1 million for any size of business.
Develop and practice an incident-response plan. A solid incident-response plan that is documented, known to all involved, and practiced at least once a year will save critical time when responding to an incident. Remember those fire drills in grade school?
Layer your defenses. This is also known as defense in depth. Develop multiple roadblocks and segment networks wherever possible.
Carefully consider the options before you pay the ransom. This is easy to say when you are in crisis mode, but the research by Sophos and others points to increased costs for those that do pay. Even after paying the ransom, the cost for upfront protection, user training, and a solid backup strategy is the least-expensive way to stay safe and recover if you do get hit.
Backups. Finally, and perhaps the most important protection against the harms of ransomware, is to have excellent backups of your systems. The difference between quickly recovering from ransomware while not paying the ransom is directly correlated to the quality of your backups. A restore from backup can many times be a quick way to give a ransomware extortionist the boot. However, you need to make sure your backup system includes more than one copy of your data. Typically for an SMB this includes a copy in your office and a copy in the cloud. We also recommend keeping backups for at least 90 days as malware sometimes remains dormant for several months before calling out to the ransomware host. There are several other backup tactics that can be implemented depending on your overall IT infrastructure.
Unfortunately, for most, ransomware is a matter of “when” and not “if.” However, you can reduce the impact it has on your business by taking steps now to better prepare for the inevitable. Ransomware does not have to be a potentially business-killing event if you properly prepare your business now. Doing nothing and ignoring the threat is no longer an option.
Jim Shea is president of Cyber Defense Institute, Inc. (www.cyberd.us), a Syracuse–based, regional cybersecurity consulting and training firm specializing in cybersecurity regulatory compliance, cyber risk management, and cybersecurity assessments. Contact Shea at jrshea@cyberd.us. Brandon Finton is the senior security engineer at Cyber Defense Institute. Contact him at bfinton@cyberd.us.

Syracuse City School District Educational Foundation elects new board members
SYRACUSE, N.Y. — The Syracuse City School District (SCSD) Educational Foundation recently announced that the following six people have been elected to serve three-year terms as directors on its board of directors: • Rich Conway, director of sales at Syracuse Office Environments • Kari Krause, state-licensed real-estate salesperson at Acropolis Realty Group • Kenyon Black, program director for
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE, N.Y. — The Syracuse City School District (SCSD) Educational Foundation recently announced that the following six people have been elected to serve three-year terms as directors on its board of directors:
• Rich Conway, director of sales at Syracuse Office Environments
• Kari Krause, state-licensed real-estate salesperson at Acropolis Realty Group
• Kenyon Black, program director for Le Moyne College Upward Bound Program
• Diana Clark Perez, Spanish teacher at SCSD Institute of Technology at Central & adjunct Spanish instructor at Syracuse University
• Rickey Brown, principal at Diversify-NY LLC
• Tim O’Donnell, regional sales manager at CMD Outsourcing Solutions
Founded during the 2002-2003 school year, the SCSD Educational Foundation is a 501(c)(3) not-for-profit independent fundraising organization charged with providing supplemental resources for educational programs in the city schools. Foundation board members include representatives of local corporations, school-district administrators, government officials, and two district high-school students.
Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.