This page contains a Flash digital edition of a book.
CYBER SECURITY


One More Thing For Public Assembly Facility Professionals To Worry About By Paul Smith and Russ Simons


In 2016 the International Association of Venue Managers (IAVM) cre- ated the Venue Safety & Security Committee. This committee is the modern version of our organization’s previous Life Safety Committee. The new committee’s mission is: The Venue Safety & Security Committee represents and advocates


for safety and security interests of the venue management industry fur- thering the mission of the Academy for Venue Safety & Security with    encourage and equip professionals in the discipline of life safety and security operations and management. This new committee lead by John Siehl, chairman, and Russell


  - sionals who are committed to representing the interests and opportu- nities for public facility management professionals in all areas relating to safety and security, including the continued success of the Academy for Venue Safety & Security (AVSS). As part of the process of understanding the nature of the threats, risks and vulnerabilities that face our industry, it became clear that we needed to pay attention to the evolving threat that cyber-attacks are playing in our industry. Our response was to create a working group of professionals from both inside IAVM and outside experts to identify, inform and prepare our members for this threat. Honestly, there are some people who believe that it cannot or will


            Based on the size and magnitude of recent hacks that have compro- mised the personal information of customers at Target, Sony, Adobe,  good chance that your personal information has been exposed. I know that many of you are right now thinking that cannot be me, no one has contacted me, I am sure I would know if that happened. I  www.haveIbeenpwned.com, enter your email address(es) and see the results. My own email address shows that my information has been   hack, you know, the biggest one in history. Let’s start with the basics for you and your business. Sometimes the most obvious IT security issues can be overlooked.


Without getting too technical, here are some points to consider when you are reviewing your organization’s cyber protection. They may seem straightforward, but they are worth reviewing.


Physical security Large buildings with continually changing complex networks can re-   


18 Facility Manager Magazine


are not closed or rerouted on your switch, anyone can physically plug into your network. Close any unused ports on your switches. Network monitoring tools can also be used to track what devices are connected.   manage in large venues. Ensuring that these areas are locked up and   breach or malicious sabotage.   but they also keep your data safe from extortion attacks. Cybercrimi- nals are increasingly encrypting data and holding it hostage until they  one copy of your critical business data.


Software Updates  holes in the Czechoslovakia version of your email application’s contact sharing connections, but there could be a vulnerability there. Even if you aren’t using that part of the software, you could be at risk. Soft-    -  switches to your servers and desktop operating systems or the phone in your pocket. Most updates are not released for extra bells and whistles; they are for security reasons. By doing updates as soon as they are released, you are greatly reducing your risks.


System Setup  up to date. Everything for your business should be on your side of the        port, only allow it from certain IP addresses or MAC (Media Access  there are out there. Think of it like leaving your car door unlocked           - locked door. The same goes for keeping your data on the inside of  you can and use as much encryption as possible.  -   - essary and no more.


Policies and Procedures -


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52