GRCA_CommerceQuarterly_Spring2018 - 16

feature continued
5. It is vital to regularly backup important business data and
information on all computers.
6. Access to company computers should be controlled. Each
employee should have his or her own user account. A company's
computers should not be used by unauthorized individuals.
Strong passwords for each user account should also be required.
Additionally, IT staff and key personnel should be the only ones
to have administrative privileges.
7. Company Wi-Fi networks should be secured. The router
should also be password protected.

Businesses are faced with these same decisions and cyber security
risks. In fact, according to a report by Verizon, small businesses
make up 61 percent of data breach victims. Cyber security is an
issue of great concern to a business owner, regardless of the size of
the organization. Decisions being made on a regular basis regarding
company data, emails, website, customer information, marketing,
and so much more need to be examined through a "cyber-security"

8. Best practices for company credit cards should be used. The
most trusted tools and anti-fraud services should be used by the
business' financial institution, and all online payments should
be secure.
9. Employees should not be given access to all systems. Employees
only need access to systems they use for their jobs, and should
also need permission to install software to company computers.
10. Employees should be required to create unique passwords
and change them routinely.

Unfortunately, many smaller businesses believe that a cyberattack
won't happen to them. Businesses cannot let that false sense of
security impair their cyber security decisions. According to a recent
article in Business News Daily, smaller businesses are a hacker's
"cybersecurity sweet spot," meaning they have more digital assets to
target than a consumer, but they have less security compared to
large corporations like Target or Equifax (and they still got hacked).

These tips are great for any business evaluating or developing
their cyber security practices. Even if you have all of these practices
already in place, employee training and empowering employees to
be the first line of defense when it comes to cyber security issues
should be the number one priority. Keep in mind that in order to
be effective, employee training on cyber security should be user
friendly and simple.

Just like protecting our children is a community effort, protecting
a business' cyber security needs to be a collaborative effort and
engrained in all aspects of the organization, from IT, to employee
training, to developing a security strategy and policies.

As for the safety of our children, communication is key. Talk to
your children about their online activity or even just about their
school day. Active monitoring and open discussion are key to keeping
our children safe. You can also review privacy and security settings
on all household devices, and educate yourself on which apps and
social media sites are most popular and how children are using them.
Finally, make protecting our children a community commitment.
Talk to your child's teachers, counselors, coaches, friends' parents,
or anyone else your child comes in contact with about internet risks
and how you can work together to prevent them.

The Federal Communications Commission (FCC) offers ten
cyber security tips for businesses. The following tips should be
considered when developing a cyber security strategy.
1. Basic security practices and policies should be established for
employees. These should include password and internet usage
guidelines, and penalties for violating such policies. Define how
employees should handle and protect customer information and
company data.

As we continue to use social media and the internet for our daily
business and marketing operations and our own personal use, we
should be taking measures to safeguard our own information. As a
community, we need to work together to keep everyone safe.

2. Make sure the business' hardware has the most up-todate security software, operating systems, and web browsers.
Updating these on a regular basis is an important defense against
The Keeping Kids Safe: Cyber Security forums were hosted by the Berks
viruses, malware, and other online threats.
County Intermediate Unit (BCIU), the Pennsylvania Governor's Office
3. Use a firewall. This will help prevent people from outside of
of Homeland Security, the Berks County District Attorney's Office, and
the network from accessing any data. Make sure the operating
the Pennsylvania State Police. The keynote speaker, Michele Stuart,
system's firewall is enabled, and if the employees work from
is a licensed private investigator with 20 years of experience. She
home, they should also be protected.
provides seminars and private training on her specialized investigative
4. Protect the company's mobile devices. Many organizations techniques for both federal and state levels of law enforcement agencies
provide company mobile devices such as cell phones and tablets. and military intelligence throughout the U.S. including attendees of the
If employees are conducting confidential business using these Department of Homeland Security, U.S. Marshals, FBI, DOJ, Border
devices, they should be required to password-protect them, Patrol, Indian Tribal Nations, and local law enforcement agencies
encrypt data, and install security apps. Reporting procedures throughout the country.
should also be in place for lost or stolen equipment.



Table of Contents for the Digital Edition of GRCA_CommerceQuarterly_Spring2018

GRCA_CommerceQuarterly_Spring2018 - 1
GRCA_CommerceQuarterly_Spring2018 - 2
GRCA_CommerceQuarterly_Spring2018 - 3
GRCA_CommerceQuarterly_Spring2018 - 4
GRCA_CommerceQuarterly_Spring2018 - 5
GRCA_CommerceQuarterly_Spring2018 - 6
GRCA_CommerceQuarterly_Spring2018 - 7
GRCA_CommerceQuarterly_Spring2018 - 8
GRCA_CommerceQuarterly_Spring2018 - 9
GRCA_CommerceQuarterly_Spring2018 - 10
GRCA_CommerceQuarterly_Spring2018 - 11
GRCA_CommerceQuarterly_Spring2018 - 12
GRCA_CommerceQuarterly_Spring2018 - 13
GRCA_CommerceQuarterly_Spring2018 - 14
GRCA_CommerceQuarterly_Spring2018 - 15
GRCA_CommerceQuarterly_Spring2018 - 16
GRCA_CommerceQuarterly_Spring2018 - 17
GRCA_CommerceQuarterly_Spring2018 - 18
GRCA_CommerceQuarterly_Spring2018 - 19
GRCA_CommerceQuarterly_Spring2018 - 20
GRCA_CommerceQuarterly_Spring2018 - 21
GRCA_CommerceQuarterly_Spring2018 - 22
GRCA_CommerceQuarterly_Spring2018 - 23
GRCA_CommerceQuarterly_Spring2018 - 24
GRCA_CommerceQuarterly_Spring2018 - 25
GRCA_CommerceQuarterly_Spring2018 - 26
GRCA_CommerceQuarterly_Spring2018 - 27
GRCA_CommerceQuarterly_Spring2018 - 28
GRCA_CommerceQuarterly_Spring2018 - 29
GRCA_CommerceQuarterly_Spring2018 - 30
GRCA_CommerceQuarterly_Spring2018 - 31
GRCA_CommerceQuarterly_Spring2018 - 32
GRCA_CommerceQuarterly_Spring2018 - 33
GRCA_CommerceQuarterly_Spring2018 - 34
GRCA_CommerceQuarterly_Spring2018 - 35
GRCA_CommerceQuarterly_Spring2018 - 36
GRCA_CommerceQuarterly_Spring2018 - 37
GRCA_CommerceQuarterly_Spring2018 - 38
GRCA_CommerceQuarterly_Spring2018 - 39
GRCA_CommerceQuarterly_Spring2018 - 40
GRCA_CommerceQuarterly_Spring2018 - 41
GRCA_CommerceQuarterly_Spring2018 - 42
GRCA_CommerceQuarterly_Spring2018 - 43
GRCA_CommerceQuarterly_Spring2018 - 44
GRCA_CommerceQuarterly_Spring2018 - 45
GRCA_CommerceQuarterly_Spring2018 - 46
GRCA_CommerceQuarterly_Spring2018 - 47
GRCA_CommerceQuarterly_Spring2018 - 48
GRCA_CommerceQuarterly_Spring2018 - 49
GRCA_CommerceQuarterly_Spring2018 - 50
GRCA_CommerceQuarterly_Spring2018 - 51
GRCA_CommerceQuarterly_Spring2018 - 52
GRCA_CommerceQuarterly_Spring2018 - 53
GRCA_CommerceQuarterly_Spring2018 - 54
GRCA_CommerceQuarterly_Spring2018 - 55
GRCA_CommerceQuarterly_Spring2018 - 56