This page contains a Flash digital edition of a book.
LEGALLY SPEAKING


CYBER ATTACKS MAKE YOU “WANNACRY”? SAVE YOUR TEARS BY PLANNING AHEAD!


C Jamie M.


Brabston, Lehr Middlebrooks Vreeland & Thompson, P.C.


yber attacks have become all too common, impacting businesses both large and small across the world. On May 12, the ransomware called “WannaCry” infected tens of thousands of computers in more than 100 companies. Hopefully no one reading this article was affected by this attack; however, you are well advised to read this article anyway, as most businesses, particularly small ones, are whol- ly unprepared to deal with a cyber breach. Hackers prey on this knowledge and often specifically target smaller businesses, which historically have lower defense mechanisms in place. Accordingly, all businesses should con- sider taking the following proactive steps NOW to protect themselves from an attack, rather than waiting to REACT if they become the next victim. 1. Install all patches and upgrades to systems upon issuance. This should go without saying, but we are all guilty of delaying upgrades on our smart phones and other devices due to the perceived inconvenience and lack of time. However, security main- tenance on your computer is basically the high-tech equivalent of checking the fluids and tire pressure on your vehicle. Take the time to maintain your systems now, or you will regret it later.


2. Back up all vital data on a continuous basis. This should also go without saying, but too often we fall behind on this fundamental responsibility. Back up all of your import- ant data, and commit to doing so regularly. There are a number of tools out there that can help you back up your data automat- ically. Always keep at least one recent backup separate from your PC or network, and never plug a good backup drive into an infected machine.


3. Install antivirus and malware software on all company devices. Keep all antivirus, anti-malware and firewall software on your machines up to date. If you don’t already have any of this software, get


some now! Many excellent, free antivirus tools are available and can be found with a quick online search. You may also want to set these programs up to scan regularly once a day or once a week. Yes, NOW! I’ll wait.


4. Train employees. The old saying “an ounce of prevention is worth a pound of cure” clearly applies here. Employees can serve as a first line of defense to combat on- line threats and can actively help to stop malware from infiltrating the company’s systems. A strong security program paired with employee education about the warn- ing signs, safe practices and responses aid tremendously in preventing these threats. Remind employees about the importance of setting up complex passwords that are different for different devices and systems. Employees must be trained regularly on how to identify phishing emails and how to avoid cyber attacks. Just say no to suspi- cious emails and links! Never click links or download files/attachments from suspicious looking websites or emails, and make sure that your employees are informed to do the same. Avoid downloading any files from unknown or untrusted sources. Be careful when clicking directly on links in emails, even if the sender appears to be known; attempt to verify web addresses inde- pendently (e.g., contact your organization’s helpdesk or search the Internet for the main website of the organization or topic men- tioned in the email). Exercise caution when opening email attachments. Be particularly


Phone consultations with LMVT are a member benefit and are included in the cost of NALP membership. Please call the LMVT main office at 205-326-3002 and ask for Richard Lehr.


28 THE LANDSCAPE PROFESSIONAL > JULY/AUGUST 2017


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36