Archive for May, 2018

Why a Phone Company Merger Will Mean Cybersecurity Concerns for Your Office

Posted on: May 16th, 2018 by Jessica Diehl No Comments

When Sprint announced it merger with T-Mobile, the primary message given to the press was the following:

  • Lower Prices
  • Better coverage
  • Fast creation of a 5G network

Most people can understand the first two and see only good things.  However, the 5G deployment coming at a faster pace will impact everyone’s network, whether you use 5G or not.  Let me explain.

5G and Mobile Devices

5G networking gives mobile devices faster access to broadband than anything provided at your work.  For example, a 1 GB hardwired office connection is 200 mB slower than using your phone to connect to the Internet.

The first question that any thoughtful user will ask when they have 5G on their phone is "Why would I want to plug in at work when the outcome is slower access to everything?"

5G Cybersecurity Concern

5G represents a security concern beyond current thinking.  Currently, network and systems managers have not struggled to implement a strategy that imposes rules upon you when you use their networks.  They make you run the latest software, they log access to the Internet and they apply updates, with all these services built upon the assumption that you are using their network.

Who will apply rules to keep your users safe, if the networks that you expect them to use aren’t as good as the competitor?  Sure, T-Mobile, Verizon and AT&T have never been considered competitors, as they only offer tools to help with communications.  Now, though, their networking speeds beat in-house wire and wireless networks.  This will require a response unlike any we have recently seen.

What is your response?  Offer 10 GB to your users, making sure that there is still motivation to use the wires in your walls or leave the 1 GB in place and pretend that a rule that says, “You MUST use the corporate network to access network resources,” will somehow be followed.  Sure, there are people that think speed limits keep everyone from speeding, but do they really do that?

How will you penalize people from wanting to do their job more efficiently and quickly?

At TNT, we think the answer is to be “better” than the competition.  Get an assessment of where you are currently at, and get us to help you create a pathway to be ahead of the 5G wave.

Share this post:

American Businesses in Denial about Data Breaches

Posted on: May 10th, 2018 by Jessica Diehl No Comments

Human nature mandates certain outcomes.  High on that list is when you break someone’s trust, it takes time to get that trust back.  If you lie to your friend, sleep around on your wife/husband or steal from your boss, once you confess your sin, it takes time to get back into good graces with those whom you are close to.

American business is in deep denial on this point.  There is a fundamental belief that an apology and a commitment to do better is enough.

I got a notice from my health care provider that my security information was stolen in a data breach on Jan 10th of this year.  They apologized for the event and told us that they were taking measures to prevent it from happening again.  They shared that the local police contacted THEM to inform them of the data breach, and that it was not initially detected by internal measures.

I received their letter in early May.

When we teach our children how to handle life’s mistakes, we tell them to confess their crimes and accept the consequences.  My healthcare provider chose not to confess, yet they asked for immediate forgiveness.  They seem not to know that this is not how humans interact.  Imagine telling your wife you cheated on her and expecting to sleep in the same bed, the same night.

Loss of Trust

As we talk with businesses who have secure information and suggest that the leaking out of that information would result in a loss of trust, they often go into a state of denial on two fronts.  Their phraseology looks like one of the two of these:

  • This won’t happen to me. We are a small business, and no one targets small businesses.
  • We don’t have anything that is worth stealing, and even it is stolen, it doesn’t affect us.

They fail to see that their customers may, in fact, consider their sloppy practices offensive and begin to wonder what else is sloppy within the organization.

Be smart with information security.  Don’t be like my health care organization.  I won’t forgive you in real time.

The best idea is to do your best to prevent this event from happening in the first place.

Is your business prepared?  Reach out to TNT today for a free Ransomware Readiness Check to find out.

Share this post:

The Network Team