Equip - Fall 2016 - 8


TECHNOLOGY

How Cyber-Secure
Is Your Company?
Here's how to steer clear of "smart technology" threats
By John Essner

S

* Keep a record of your account numbers, their

expiration dates, and the phone numbers for
reporting fraud.
* Let your employees know they shouldn't lend
their card to anyone.
* Never give out account numbers over the
phone unless you're the one calling and you
know for sure the number you have called
belongs to a reputable company.
* Encourage employees to carry only the cards
they need for a particular outing, to minimize
losses if a wallet or purse gets stolen.
* Always keep your eye on the card when it's being use for a transaction, and be sure you get it
back before you leave.

8

Fall 2016 // EQUIP MAGAZINE

* Fill in all the blanks-draw a line through the

versions and receive daily updates from the
software manufacturer. The software should be
running anti-virus and intrusion protection.
* Use of software: Don't download and run
software from an untrusted source. Check with
your company's IT department to see if they can
support the software in question.
What about your company's networked
* Restrict access: Limit computer access only
computers? How can you keep them safe from
to those who need it.
damaging intrusions? Mere anti-virus software
* Firewall protection: Your computer systems
does not and cannot prevent the new heightened
should be protected by the network firewall.
threat created by today's adversaries. In many
* Computer account protection: Never
cases, companies are not at all aware of the comshare your account name and password. Change
promises.
your password every 90 days at a minimum, or
In a recent, not-so-unusual case reported in
refer to your company's policy.
The New York Times, the owners of a tiny Mid* Security awareness: Establish a cybersecuwestern welding company learned their computrity awareness program in your company. Seers had been taken over by Chinese hackers who
curity tips should be sent to employees to keep
were using them to spy on U.S. companies.
them informed. For example, when you open an
Luckily, the technology industry has estabemail, never open an attachment or click on a
lished standards to protect its products. These
link from an untrusted source.
standards define basic security measures to re* Cyber-response: Report any cyber-incident
duce the risk. Even a small motorcoach company
to your company for any company-owned
can take these basic, inexpensive (or free) steps to
device.
protect itself:
What about your company's smart technology?
Is it secure? Can your smart technology
* Device software: Your operating system
prevent attacks from your adversaries?
and security software should run the latest
spaces above the total amount due so that no
one can write in something there later.
* Save your receipts, and reconcile them with
your statements as soon as you can. Call up the
card issuer if you notice any strange charges.

ISTOCK (COMPOSITE)

mart technology and the Internet of Things
are revolutionizing how motorcoach companies do business today. For every benefit computers create, they seem to pose an equal number of
risks and headaches.
We depend on technology to make running
our companies easier and to make our passengers'
lives safer. Technology has changed business for
the better, but it has also introduced numerous
cybersecurity challenges. The greatest targets
of cyber-threats? Credit cards and supported
computer systems.
If your company uses credit cards (or if you
issue them to your trusted employees), be aware
that in the past few years technologies that process credit cards have been targeted by hackers,
phishers, and corporate adversaries, and perhaps
worse, identity theft has become almost normal
and commonplace.
The risk of a breach is high when a credit card
is used, either through a merchant's card reader
or the technology processing the transaction. The
average cost when a card is compromised? It's
$221, according to a 2016 study by IBM and the
Ponemon Institute. And remember-that's the
average loss.
The payment card industry has established
quality of service standards to protect its technology as well as reduce the cyber-risk and the potential impact to a company. If your business uses
company-issued credit cards, follow these steps
from the Federal Trade Commission to ensure
the security of all transactions:



Table of Contents for the Digital Edition of Equip - Fall 2016

Inside
Equip - Fall 2016 - Inside
Equip - Fall 2016 - 2
Equip - Fall 2016 - 3
Equip - Fall 2016 - 4
Equip - Fall 2016 - 5
Equip - Fall 2016 - 6
Equip - Fall 2016 - 7
Equip - Fall 2016 - 8
Equip - Fall 2016 - 9
Equip - Fall 2016 - 10
Equip - Fall 2016 - 11
Equip - Fall 2016 - 12
Equip - Fall 2016 - 13
Equip - Fall 2016 - 14
Equip - Fall 2016 - 15
Equip - Fall 2016 - 16
Equip - Fall 2016 - 17
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2016fall
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2016summer
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2016spring
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2016winter
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2015fall
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2015summer
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2015spring
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2015winter
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2014fall
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2014summer
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2014spring
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2014winter
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2013fall
https://www.nxtbook.com/nxtbooks/pohlyco/equip_2013summer
https://www.nxtbookmedia.com