search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
KICKER


TECHNOLOGY TODAY By Michael Mayberry


Cyber security for landscape pros, Part 2


L


ast month, we talked about a lot of the po- tential problems your business could face if you do not create a culture of awareness about cyber security risks. Now we will re-


view the steps you can take to operate more securely. Te most important item in your arsenal to fight


cyber criminals is education. Please make sure you are taking the time to talk to your users about the po- tential hazards and common attacks. Adhere to pol- icies in your company that create additional layers of security when monetary requests are made via email. At Level Green, our company policy is that the own- ers will never ask for gift cards and that all monetary requests should be verified through a phone call or text message. Show your users what a spoofed email looks like (it’s harder to spot on phones) and compare that to a real email. Talk to them about getting emails from unexpected people with attachments. You need to constantly talk about it until it becomes culture.


A great way to be more protected, which you have probably already done, is to move to cloud platforms.


Another great tool for fighting email attackers is a spam filter. Tere are lots of them available on the market. Some have very granular configurations, while others are very easy to set up and manage. Some even use artificial intelligence to help predict problematic patterns. Both Gmail and Microsoft Exchange (Outlook) offer some rudimentary filter- ing capabilities, but I would highly recommend in- creasing your protection level by adding a third-party filter.


A great way to be more protected, which you have


Michael Mayberry is the chief technology officer for Level Green Landscape LLC in Upper Marlboro,


Maryland. He can be reached at michael.mayberry@ levelgreenlandscaping.com.


8 Irrigation & Lighting Fall 2022


probably already done, is to move to cloud platforms. With most cloud platforms, your data is stored in a secure database, backed up and replicated by the plat- form provider. If you use cloud platforms, you have less to worry about because you are not storing and therefore needing to protect the data. Te onus of that lies with the platform. I say “most” of the time because you need to read your terms of service with each platform and truly understand how your data is being kept and backed up. Some providers may not be backing up data, or they may not be following best


practices for data storage. One of the most important questions you want to ask is: How are they storing sensitive data? You want to make sure anything sensi- tive is being stored using encryption and not in plain text. Tat way, even if the database is compromised, the data is still protected. Another benefit to cloud platforms means that you


no longer need to maintain and protect on-premises servers. When you run an application or store data within your network, you need to make sure you have great firewall protection so that people cannot break in. You also need systems that can detect if data is being accessed in a strange manner (such as large vol- umes of data being moved outside the network or to a flash storage device) so that an alert can be triggered. As more of your systems move to cloud platforms, the need for hardening your incoming network defenses drops since there is nothing within your network to protect. If you do not have an on-premises server to run your applications, email, file storage or active di- rectory, then the complexity of your network topogra- phy will also decrease. Tere is no need to set up site- to-site virtual private networks if your shared files are stored with a service like Dropbox or Google Drive, where files are accessible from anywhere. Most cloud platforms also allow great management so you can set up different permission levels to grant different peo- ple within your organization access to specific items, i.e., setting up a folder for only the sales team. As your network complexity decreases, you will likely not need a managed services provider to help administer your network, which can lower your IT costs. Te culture of security awareness should not stop


with your managers or administrative staff. Your crews and field staff are important components of your security posture as well. A mobile device manag- er will allow you to manage company phones handed out to staff to prevent unauthorized data usage, block unwanted app downloads and remotely wipe a device if it gets lost or stolen. If your field staff uses company email, they need the same training as you are giving your office staff. With these practices in place and a strong security


culture within your company, you can rest a little more easily with technology.


Missed the first part of this column? Read it online at irrigationandlighting.org/cyber-security-part-1.


irrigationandlighting.org


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52